ile0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3311.985908][T17383] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3312.006354][T17383] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400010ff050005002401", 0x2e}], 0x1}, 0x0) 12:17:41 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x0) [ 3312.141196][T17391] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3312.172300][T17391] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3312.230874][T17391] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3312.353605][T17398] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:17:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3312.419350][T17391] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3312.439261][T17391] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3312.449075][T17398] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3312.459931][T17391] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3312.498824][T17401] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:17:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400048ff050005002401", 0x2e}], 0x1}, 0x0) 12:17:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:42 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 12:17:42 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137155a370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3312.810589][T17412] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:17:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3312.862005][T17412] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:42 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x3}, 0x0) 12:17:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d0040004cff050005002401", 0x2e}], 0x1}, 0x0) 12:17:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:42 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137155b370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3313.327544][ T2457] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 3313.383850][T17431] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4}, 0x0) 12:17:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:43 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137156b370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400060ff050005002401", 0x2e}], 0x1}, 0x0) 12:17:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0) [ 3313.880970][T17446] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3313.904502][T17450] __nla_validate_parse: 4 callbacks suppressed [ 3313.904539][T17450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6}, 0x0) [ 3314.052348][T17450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400068ff050005002401", 0x2e}], 0x1}, 0x0) 12:17:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:44 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e0a0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3314.258006][T17461] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7}, 0x0) 12:17:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d0040006cff050005002401", 0x2e}], 0x1}, 0x0) [ 3314.460108][T17469] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3314.640405][T17469] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8}, 0x0) [ 3314.682655][T17477] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400074ff050005002401", 0x2e}], 0x1}, 0x0) 12:17:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x9}, 0x0) 12:17:44 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e5a0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3314.989383][T17487] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) 12:17:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d0040007aff050005002401", 0x2e}], 0x1}, 0x0) 12:17:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3315.310933][T17493] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3315.453456][T17493] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3315.492294][T17499] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xc}, 0x0) 12:17:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff020005002401", 0x2e}], 0x1}, 0x0) 12:17:45 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e5b0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3315.901531][T17513] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xe}, 0x0) 12:17:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3316.031123][T17516] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff030005002401", 0x2e}], 0x1}, 0x0) [ 3316.200676][T17522] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 12:17:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3316.352993][T17525] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:46 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e6b0248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff040005002401", 0x2e}], 0x1}, 0x0) 12:17:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x48}, 0x0) 12:17:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3316.815685][T17537] validate_nla: 44 callbacks suppressed [ 3316.815753][T17537] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3316.840450][T17540] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3316.930228][T17542] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3316.941512][T17537] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3316.967907][T17542] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3316.978272][T17537] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4c}, 0x0) 12:17:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff060005002401", 0x2e}], 0x1}, 0x0) [ 3317.144200][T17537] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3317.180759][T17537] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3317.199384][T17537] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3317.237485][T17551] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:17:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3317.369443][T17555] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:17:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x60}, 0x0) 12:17:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:47 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370300038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3317.462149][T17555] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3317.631212][T17562] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:17:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff070005002401", 0x2e}], 0x1}, 0x0) 12:17:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x68}, 0x0) [ 3317.759155][T17564] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:17:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6c}, 0x0) 12:17:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3317.919375][T17570] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff090005002401", 0x2e}], 0x1}, 0x0) 12:17:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x74}, 0x0) 12:17:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370348038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3318.373718][T17584] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7a}, 0x0) 12:17:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff250005002401", 0x2e}], 0x1}, 0x0) 12:17:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370a48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 3318.820932][T17596] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3318.967175][T17599] __nla_validate_parse: 5 callbacks suppressed [ 3318.967231][T17599] netlink: 43028 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff5d0005002401", 0x2e}], 0x1}, 0x0) 12:17:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x300}, 0x0) 12:17:49 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e373548038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3319.372949][T17614] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3319.516907][T17618] netlink: 42984 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050003002401", 0x2e}], 0x1}, 0x0) 12:17:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x500}, 0x0) [ 3319.602683][T17618] netlink: 42984 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3319.841527][T17630] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:49 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e375a48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x0) 12:17:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050205002401", 0x2e}], 0x1}, 0x0) 12:17:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3320.154615][T17635] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x700}, 0x0) [ 3320.273758][T17635] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3320.284847][T17641] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:50 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050305002401", 0x2e}], 0x1}, 0x0) 12:17:50 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e375b48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x900}, 0x0) 12:17:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3320.665650][T17654] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(0x0, 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:50 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050405002401", 0x2e}], 0x1}, 0x0) [ 3320.782187][T17656] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3320.896633][T17656] netlink: 42948 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:50 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e376b48038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 3321.193829][T17673] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(0x0, 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xc00}, 0x0) 12:17:51 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050505002401", 0x2e}], 0x1}, 0x0) [ 3321.354606][T17677] netlink: 42932 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3321.536587][T17688] netlink: 42932 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(0x0, 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 12:17:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3321.696599][T17693] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:51 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3720f0038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:51 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050605002401", 0x2e}], 0x1}, 0x0) 12:17:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x2483}, 0x0) [ 3321.943261][T17702] validate_nla: 47 callbacks suppressed [ 3321.943313][T17702] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3321.997471][T17702] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3322.044271][T17706] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3322.087351][T17706] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3322.232033][T17713] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3322.271738][T17702] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3322.332640][T17702] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:17:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4800}, 0x0) 12:17:52 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050705002401", 0x2e}], 0x1}, 0x0) 12:17:52 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:52 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370242038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3322.756417][T17723] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:17:52 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3322.830639][T17726] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:17:52 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4c00}, 0x0) [ 3322.901408][T17729] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3322.914359][T17726] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3322.928491][T17729] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3322.995193][T17729] netlink: 44572 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, 0x0) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:53 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050805002401", 0x2e}], 0x1}, 0x0) 12:17:53 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 12:17:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:53 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370243038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:53 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 3323.460658][T17748] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:53 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050905002401", 0x2e}], 0x1}, 0x0) 12:17:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, 0x0) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:53 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 12:17:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:53 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37025a038047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3323.875368][T17759] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:53 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6800}, 0x0) 12:17:53 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050a05002401", 0x2e}], 0x1}, 0x0) [ 3324.201365][T17773] __nla_validate_parse: 3 callbacks suppressed [ 3324.201439][T17773] netlink: 38428 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, 0x0) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3324.398772][T17777] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3324.408669][T17773] netlink: 38428 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:54 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050c05002401", 0x2e}], 0x1}, 0x0) 12:17:54 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) 12:17:54 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37025b038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<']) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3324.723061][T17792] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:54 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050e05002401", 0x2e}], 0x1}, 0x0) 12:17:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:54 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7400}, 0x0) [ 3324.973503][T17797] netlink: 38172 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3325.158094][T17797] netlink: 38172 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3325.168664][T17806] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<']) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:55 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 12:17:55 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050f05002401", 0x2e}], 0x1}, 0x0) 12:17:55 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37026b038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3325.519354][T17815] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:55 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8100}, 0x0) [ 3325.707994][T17823] netlink: 34076 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:55 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff051005002401", 0x2e}], 0x1}, 0x0) 12:17:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<']) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3325.910787][T17823] netlink: 34076 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:55 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248028047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:55 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8324}, 0x0) [ 3326.085555][T17834] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:56 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff054805002401", 0x2e}], 0x1}, 0x0) 12:17:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3326.566105][T17854] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:56 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 12:17:56 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:56 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff054c05002401", 0x2e}], 0x1}, 0x0) 12:17:56 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248048047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:56 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 3326.865669][T17863] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3327.023868][T17865] validate_nla: 40 callbacks suppressed [ 3327.023922][T17865] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3327.072027][T17872] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:17:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:57 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:57 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff056005002401", 0x2e}], 0x1}, 0x0) 12:17:57 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 12:17:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3327.252602][T17875] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:17:57 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248058047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3327.388678][T17882] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3327.453029][T17882] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3327.526946][T17888] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:17:57 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:57 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff056805002401", 0x2e}], 0x1}, 0x0) 12:17:57 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 3327.789575][T17895] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3327.841265][T17895] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 3327.889525][T17903] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3327.926539][T17903] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3327.976166][T17895] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3327.994145][T17902] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:17:57 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:57 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff056c05002401", 0x2e}], 0x1}, 0x0) 12:17:57 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 12:17:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:58 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248068047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3328.297718][T17913] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:58 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 12:17:58 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff057405002401", 0x2e}], 0x1}, 0x0) 12:17:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3328.611282][T17921] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 3328.640477][T17921] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3328.760942][T17929] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3328.777234][T17921] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 12:17:58 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) 12:17:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3328.832387][T17921] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:17:58 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff057a05002401", 0x2e}], 0x1}, 0x0) 12:17:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:58 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248078047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3329.124877][T17941] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:59 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) 12:17:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:59 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050006002401", 0x2e}], 0x1}, 0x0) 12:17:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:59 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248088047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:17:59 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) 12:17:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3329.642836][T17959] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:17:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:59 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050007002401", 0x2e}], 0x1}, 0x0) 12:17:59 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) 12:17:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fs', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:17:59 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248098047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3330.090998][T17974] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:00 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x9000000}, 0x0) 12:18:00 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050009002401", 0x2e}], 0x1}, 0x0) 12:18:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3330.392048][T17982] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3330.521751][T17991] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:00 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) 12:18:00 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050020002401", 0x2e}], 0x1}, 0x0) 12:18:00 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:00 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fs', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:00 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0) [ 3330.815172][T17998] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:00 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480a8047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:00 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050025002401", 0x2e}], 0x1}, 0x0) 12:18:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:01 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:01 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 3331.239672][T18013] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fs', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:01 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05005d002401", 0x2e}], 0x1}, 0x0) 12:18:01 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480b8047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:01 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) 12:18:01 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:01 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3331.809541][T18031] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:01 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050002002401", 0x2e}], 0x1}, 0x0) 12:18:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x48000000}, 0x0) 12:18:02 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248108047000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3332.346081][ T3265] ieee802154 phy0 wpan0: encryption failed: -22 [ 3332.352495][ T3265] ieee802154 phy1 wpan1: encryption failed: -22 12:18:02 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3332.469595][T18050] validate_nla: 36 callbacks suppressed [ 3332.469612][T18050] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3332.528235][T18052] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x4c000000}, 0x0) [ 3332.586656][T18053] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3332.601590][T18052] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3332.637466][T18053] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 12:18:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3332.678021][T18053] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:02 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050003002401", 0x2e}], 0x1}, 0x0) [ 3332.814553][T18059] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3332.870670][T18053] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3332.897938][T18061] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3332.916307][T18053] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 3332.948000][T18053] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:02 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) [ 3333.071529][T18068] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3333.118582][T18068] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:02 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248118047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:03 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3333.226979][T18073] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:03 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050004002401", 0x2e}], 0x1}, 0x0) 12:18:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x65580000}, 0x0) 12:18:03 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3333.442962][T18080] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3333.592397][T18080] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:03 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x68000000}, 0x0) 12:18:03 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050006002401", 0x2e}], 0x1}, 0x0) 12:18:03 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248358047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:04 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x6c000000}, 0x0) 12:18:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3334.336893][T18102] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:04 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050007002401", 0x2e}], 0x1}, 0x0) [ 3334.446474][T18104] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3334.583365][T18104] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) 12:18:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:04 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3334.849887][T18121] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:04 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702485a8047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:04 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050009002401", 0x2e}], 0x1}, 0x0) 12:18:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) [ 3335.172090][T18134] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:05 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,sma', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3335.258456][T18134] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3335.283473][T18138] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x81000000}, 0x0) 12:18:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:05 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:05 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050025002401", 0x2e}], 0x1}, 0x0) 12:18:05 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702485b8047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x83240000}, 0x0) 12:18:05 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3335.857250][T18155] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3335.869789][T18153] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:05 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05005d002401", 0x2e}], 0x1}, 0x0) 12:18:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 12:18:05 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3336.013771][T18162] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3336.126064][T18166] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:06 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702486b8047000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:06 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005022401", 0x2e}], 0x1}, 0x0) 12:18:06 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 12:18:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:06 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3336.692712][T18179] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3336.705879][T18182] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3336.889252][T18191] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:06 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 12:18:06 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005032401", 0x2e}], 0x1}, 0x0) [ 3336.983557][ T2457] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 12:18:06 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:06 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803800c000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:07 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=b', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3337.292519][T18200] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:07 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffa888}, 0x0) [ 3337.341060][T18203] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:07 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005042401", 0x2e}], 0x1}, 0x0) [ 3337.538248][T18203] validate_nla: 33 callbacks suppressed [ 3337.538302][T18203] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3337.843189][T18203] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3337.915867][T18203] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:07 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:07 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 12:18:07 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038035000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3338.075296][T18217] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:07 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3338.151284][T18217] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3338.205618][T18218] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value [ 3338.245585][T18222] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:08 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005052401", 0x2e}], 0x1}, 0x0) 12:18:08 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3338.371011][T18225] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:18:08 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 3338.457056][T18225] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:08 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3338.525187][T18225] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3338.550962][T18232] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3338.590183][T18232] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:08 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3338.633790][T18235] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3338.706700][T18225] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3338.741498][T18225] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:08 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005062401", 0x2e}], 0x1}, 0x0) [ 3338.783704][T18225] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:08 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 12:18:08 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:08 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:08 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038046000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3339.092186][T18247] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:08 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005072401", 0x2e}], 0x1}, 0x0) 12:18:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fo', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 3339.296095][T18255] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3339.350485][T18260] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3339.468770][T18255] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:09 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005082401", 0x2e}], 0x1}, 0x0) 12:18:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 12:18:09 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803805a000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3339.751708][T18272] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:09 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005092401", 0x2e}], 0x1}, 0x0) 12:18:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x2) 12:18:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:10 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803805b000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3340.184945][T18285] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x3) 12:18:10 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050a2401", 0x2e}], 0x1}, 0x0) 12:18:10 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:10 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803806b000000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4) [ 3340.593335][T18299] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:10 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050c2401", 0x2e}], 0x1}, 0x0) 12:18:10 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047020000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3341.038584][T18319] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x5) 12:18:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3341.129623][T18318] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:11 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowne', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:11 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050e2401", 0x2e}], 0x1}, 0x0) 12:18:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6) [ 3341.297437][T18324] __nla_validate_parse: 5 callbacks suppressed [ 3341.297502][T18324] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3341.685506][T18337] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3341.698162][T18339] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:11 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050f2401", 0x2e}], 0x1}, 0x0) 12:18:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7) 12:18:11 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:11 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047030000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3341.957408][T18346] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3342.139415][T18354] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:12 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8) 12:18:12 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005102401", 0x2e}], 0x1}, 0x0) 12:18:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:12 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3342.347947][T18354] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:12 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x9) [ 3342.436815][T18364] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:12 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047040000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3342.879607][T18380] validate_nla: 38 callbacks suppressed [ 3342.879674][T18380] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3342.919124][T18380] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3342.935372][T18385] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3342.973902][T18380] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3343.004415][T18385] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3343.105510][T18393] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:12 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005482401", 0x2e}], 0x1}, 0x0) 12:18:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:12 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:12 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa) 12:18:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3343.216456][T18380] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:18:13 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500054c2401", 0x2e}], 0x1}, 0x0) [ 3343.418631][T18380] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3343.430879][T18380] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:13 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047050000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:13 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc) 12:18:13 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3343.583884][T18400] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:13 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(0x0, 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3343.636717][T18400] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3343.649179][T18403] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3343.704745][T18405] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3343.715796][T18403] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:13 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005602401", 0x2e}], 0x1}, 0x0) [ 3343.813835][T18403] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:13 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe) 12:18:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:13 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3344.023615][T18403] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:13 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047060000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3344.114025][T18411] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:13 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(0x0, 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:14 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x10) 12:18:14 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005682401", 0x2e}], 0x1}, 0x0) [ 3344.436145][T18422] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3344.488250][ T2457] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 12:18:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:14 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x48) 12:18:14 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(0x0, 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3344.642423][T18429] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:14 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:14 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500056c2401", 0x2e}], 0x1}, 0x0) [ 3344.686721][T18430] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:14 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c) 12:18:14 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047070000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3345.022304][T18445] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:14 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:14 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:15 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005742401", 0x2e}], 0x1}, 0x0) 12:18:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x60) 12:18:15 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047080000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3345.564423][T18460] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:15 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:15 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500057a2401", 0x2e}], 0x1}, 0x0) 12:18:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x68) 12:18:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:15 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:15 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047090000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3346.061207][T18478] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c) 12:18:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x74) 12:18:16 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002501", 0x2e}], 0x1}, 0x0) 12:18:16 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3346.671496][T18488] __nla_validate_parse: 4 callbacks suppressed [ 3346.671556][T18488] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:16 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a) [ 3346.829873][T18499] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3346.842178][T18497] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:17 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005005d01", 0x2e}], 0x1}, 0x0) 12:18:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:17 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380470e0000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:17 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0) 12:18:17 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3347.541573][T18515] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3347.629563][T18516] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:17 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050df801", 0x2e}], 0x1}, 0x0) [ 3347.988422][T18516] validate_nla: 37 callbacks suppressed [ 3347.988445][T18516] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3348.004085][T18516] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3348.012173][T18516] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3348.167226][T18531] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x300) [ 3348.280143][T18531] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:18 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x500) [ 3348.434411][T18535] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:18 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002501", 0x2e}], 0x1}, 0x0) 12:18:18 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380470f0000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3348.647344][T18543] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3348.831636][T18549] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3348.840782][T18549] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x600) [ 3348.925635][T18548] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value 12:18:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:18 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005005d01", 0x2e}], 0x1}, 0x0) 12:18:18 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3349.007787][T18551] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3349.019164][T18553] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3349.044220][T18551] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3349.087106][T18551] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x700) [ 3349.173293][T18551] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3349.243570][T18551] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:19 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047480000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3349.421285][T18562] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3349.480676][T18566] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:19 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:19 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:19 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005000003", 0x2e}], 0x1}, 0x0) 12:18:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3349.658629][T18571] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x900) [ 3349.762033][T18571] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:19 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380474c0000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3349.891630][T18579] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3349.948248][T18584] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa00) [ 3350.071549][T18586] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value 12:18:19 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:19 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002402", 0x2e}], 0x1}, 0x0) 12:18:19 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3350.203326][T18592] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:20 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc00) [ 3350.299172][T18596] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3350.317360][T18597] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:20 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002403", 0x2e}], 0x1}, 0x0) 12:18:20 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:20 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047600000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:20 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:20 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe00) [ 3350.895285][T18607] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value [ 3350.913253][T18611] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:20 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002405", 0x2e}], 0x1}, 0x0) 12:18:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x2483) [ 3351.392598][T18627] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4800) 12:18:21 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:21 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002407", 0x2e}], 0x1}, 0x0) 12:18:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:21 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047680000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:21 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3351.903215][T18641] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:22 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002408", 0x2e}], 0x1}, 0x0) 12:18:22 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3352.300391][T18646] __nla_validate_parse: 2 callbacks suppressed [ 3352.300467][T18646] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c00) 12:18:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3352.615993][T18646] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3352.805944][T18659] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x5865) 12:18:22 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380476c0000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:22 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:22 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002430", 0x2e}], 0x1}, 0x0) 12:18:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:23 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6000) [ 3353.358116][T18671] validate_nla: 33 callbacks suppressed [ 3353.358136][T18671] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3353.418377][T18671] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3353.441164][T18672] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3353.452838][T18675] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3353.472882][T18672] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3353.505514][T18672] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:23 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002434", 0x2e}], 0x1}, 0x0) 12:18:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6558) [ 3353.691468][T18684] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:18:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:23 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3353.744505][T18684] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3353.782105][T18687] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3353.817224][T18684] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3353.827117][T18687] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3353.899680][T18691] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:23 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047740000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:23 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002444", 0x2e}], 0x1}, 0x0) 12:18:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6800) [ 3354.172133][T18701] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3354.214665][T18705] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3354.229886][T18701] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3354.369007][T18705] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:24 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380477a0000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05000500245d", 0x2e}], 0x1}, 0x0) 12:18:24 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c00) 12:18:24 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3354.859205][T18721] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3354.915829][T18726] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7400) [ 3355.060255][T18721] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002418", 0x2e}], 0x1}, 0x0) 12:18:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:25 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047f00000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a00) 12:18:25 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:25 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3355.441428][T18739] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3355.453795][T18745] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:25 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002424", 0x2e}], 0x1}, 0x0) 12:18:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8100) [ 3355.616624][T18749] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:25 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000300d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:25 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, 0x0, &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3356.040200][T18759] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3356.090969][T18763] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:26 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8324) 12:18:26 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:26 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000500d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002436", 0x2e}], 0x1}, 0x0) 12:18:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3356.527172][T18775] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:26 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf000) 12:18:26 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002439", 0x2e}], 0x1}, 0x0) 12:18:26 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000600d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:26 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:26 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0ffff) [ 3356.924514][T18789] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002400", 0x2e}], 0x1}, 0x0) 12:18:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:27 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:27 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x1000000) 12:18:27 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000700d1bd", 0x33fe0}], 0x1}, 0x0) [ 3357.317017][T18801] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:27 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024f2", 0x2e}], 0x1}, 0x0) [ 3357.501375][T18809] __nla_validate_parse: 5 callbacks suppressed 12:18:27 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3357.587599][T18809] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:27 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x2000000) 12:18:27 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3357.707982][T18809] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3357.796783][T18818] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:27 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000900d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:28 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x3000000) 12:18:28 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024f8", 0x2e}], 0x1}, 0x0) 12:18:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3358.505782][T18836] validate_nla: 41 callbacks suppressed [ 3358.505802][T18836] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3358.525378][T18837] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3358.565838][T18837] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3358.565929][T18835] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:18:28 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4000000) 12:18:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3358.897232][T18835] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3358.989769][T18835] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:28 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024f9", 0x2e}], 0x1}, 0x0) [ 3359.183115][T18844] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:29 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x5000000) 12:18:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:29 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000e00d1bd", 0x33fe0}], 0x1}, 0x0) [ 3359.594357][T18835] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3359.602995][T18835] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3359.614301][T18835] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3359.677467][T18851] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3359.728402][T18851] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3359.763401][T18852] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff0500050024fe", 0x2e}], 0x1}, 0x0) [ 3359.849144][T18856] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3359.872912][T18856] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:29 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6000000) [ 3360.177950][T18856] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:30 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:30 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7000000) [ 3360.676457][T18871] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:30 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000f00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff05000500241f", 0x2e}], 0x1}, 0x0) 12:18:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3360.943256][T18877] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:30 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8000000) 12:18:31 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3361.227615][T18882] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3361.232267][T18877] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:31 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xa}], 0x1}, 0x0) 12:18:31 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047001f00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:31 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x9000000) 12:18:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3361.664235][T18900] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:31 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:31 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xf}], 0x1}, 0x0) 12:18:31 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa000000) [ 3361.815598][T18900] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:31 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc000000) 12:18:31 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x10}], 0x1}, 0x0) 12:18:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:32 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047311f00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:32 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3362.570419][T18924] __nla_validate_parse: 1 callbacks suppressed [ 3362.570485][T18924] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:32 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x25}], 0x1}, 0x0) 12:18:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:32 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047002000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:32 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe000000) 12:18:32 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, 0x0) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:33 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x30}], 0x1}, 0x0) 12:18:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3363.270612][T18945] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:33 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x10000000) 12:18:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3363.582688][T18945] validate_nla: 26 callbacks suppressed [ 3363.582753][T18945] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3363.617846][T18953] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3363.676580][T18953] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3363.698048][T18945] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3363.752319][T18945] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3363.864622][T18960] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:33 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x5d}], 0x1}, 0x0) 12:18:33 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x48000000) 12:18:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:33 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e3702480380471f3100d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3364.243974][T18970] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:34 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3364.294979][T18970] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3364.330456][T18973] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:34 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xc0}], 0x1}, 0x0) [ 3364.405756][T18974] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:18:34 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c000000) [ 3364.463958][T18974] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3364.498979][T18974] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:34 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3364.644173][T18983] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3364.806975][T18974] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3364.949456][T18983] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3365.001023][T18974] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xec0}], 0x1}, 0x0) 12:18:35 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047003f00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:35 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x60000000) 12:18:35 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3365.392410][T18997] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3365.531517][T19003] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x33fe0}], 0x1}, 0x0) [ 3365.702769][T19003] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:35 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x65580000) [ 3365.833110][T19011] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3365.856372][T19008] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value 12:18:35 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047004000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x200000ee}], 0x1}, 0x0) 12:18:35 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:35 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x68000000) [ 3366.127208][T19016] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3366.258058][T19016] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:36 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x7ffff000}], 0x1}, 0x0) 12:18:36 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047004800d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:36 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c000000) 12:18:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3367.028191][T19040] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:36 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0xfffffdef}], 0x1}, 0x0) 12:18:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x74000000) 12:18:37 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x2}, 0x0) 12:18:37 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047004c00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:37 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a000000) 12:18:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3367.612729][T19057] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3367.757712][T19065] __nla_validate_parse: 1 callbacks suppressed [ 3367.757807][T19065] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:37 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x3}, 0x0) [ 3368.281509][T18107] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 12:18:38 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x81000000) [ 3368.405150][T19065] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:38 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed45"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(0x0, 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3368.524076][T19081] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x5}, 0x0) 12:18:38 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047006000d1bd", 0x33fe0}], 0x1}, 0x0) [ 3368.876752][T19095] validate_nla: 29 callbacks suppressed [ 3368.876772][T19095] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 12:18:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x83240000) [ 3369.028505][T19095] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:38 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7}, 0x0) 12:18:38 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3369.125902][T19100] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3369.224158][T19100] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3369.277935][T19106] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3369.304465][T19106] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len [ 3369.305491][T19100] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x88a8ffff) 12:18:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x8}, 0x0) [ 3369.626629][T19118] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:18:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x9effffff) 12:18:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3369.744942][T19118] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3369.774859][T19118] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:39 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3369.859018][T19123] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 3369.870098][T19123] net veth1_virt_wifi virt_wifi0: refused to change device tx_queue_len 12:18:39 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047006800d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0ffffff) 12:18:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x30}, 0x0) [ 3370.473415][T19138] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3370.533354][T19138] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:40 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:40 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xffffa888) [ 3370.583034][T19138] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:40 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3370.690319][T19138] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3370.713264][T19138] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:40 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x34}, 0x0) 12:18:40 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xfffff000) 12:18:40 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047006c00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:41 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xffffff7f) 12:18:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x44}, 0x0) [ 3371.261821][T19161] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:41 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xffffff9e) [ 3371.439803][T19161] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x5d}, 0x0) 12:18:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:41 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047007400d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:41 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xfffffff0) 12:18:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x118}, 0x0) 12:18:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3372.062011][T19185] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(0x0, 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x324}, 0x0) 12:18:42 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xf0ffffffffffff) [ 3372.201925][T19185] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:42 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047007a00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x336}, 0x0) 12:18:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:42 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x100000000000000) 12:18:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3373.076473][T19211] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x339}, 0x0) [ 3373.193449][T19211] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x200000000000000) 12:18:43 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e37024803804700f000d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x500}, 0x0) [ 3373.795544][T19228] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffff2}, 0x0) 12:18:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3374.022611][T19228] validate_nla: 17 callbacks suppressed [ 3374.022675][T19228] netlink: 'syz-executor.2': attribute type 63 has an invalid length. 12:18:43 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x300000000000000) [ 3374.113119][T19228] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffff8}, 0x0) 12:18:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3374.190058][T19228] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3374.370570][T19246] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:44 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000200d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x400000000000000) 12:18:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffff9}, 0x0) [ 3374.669911][T19254] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3374.716801][T19254] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b951499"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3374.768068][T19257] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3374.782713][T19254] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x500000000000000) 12:18:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x7ffffffe}, 0x0) [ 3374.991887][T19266] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3375.010794][T19266] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3375.015089][T19264] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value [ 3375.027395][T19266] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3375.050102][T19269] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x0, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x600000000000000) 12:18:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:45 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000300d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0xffffff1f}, 0x0) [ 3375.354015][T19279] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x700000000000000) [ 3375.574276][T12099] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 12:18:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x2}, 0x0) [ 3375.751667][T19290] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x0, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:45 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000400d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:45 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x800000000000000) 12:18:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x3}, 0x0) 12:18:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x4}, 0x0) 12:18:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x900000000000000) 12:18:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x0, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3376.507433][T19311] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3376.637762][T19311] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x5}, 0x0) 12:18:46 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xa00000000000000) 12:18:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xc00000000000000) 12:18:47 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000500d1bd", 0x33fe0}], 0x1}, 0x0) [ 3377.193710][T19328] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000006" or missing value 12:18:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x0, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x6}, 0x0) 12:18:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0xe00000000000000) [ 3377.423220][T19338] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x7}, 0x0) 12:18:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x0, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:47 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000600d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:47 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x1000000000000000) 12:18:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x8}, 0x0) [ 3378.177256][T19360] __nla_validate_parse: 1 callbacks suppressed [ 3378.177313][T19360] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3378.506802][T19360] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4800000000000000) 12:18:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x0, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x9}, 0x0) 12:18:48 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000700d1bd", 0x33fe0}], 0x1}, 0x0) [ 3379.094746][T19378] validate_nla: 21 callbacks suppressed [ 3379.094767][T19378] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x4c00000000000000) 12:18:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3379.453115][T19392] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3379.498602][T19393] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3379.519397][T19393] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd092230"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xa}, 0x0) [ 3379.548127][T19393] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6000000000000000) [ 3379.680837][T19393] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3379.732205][T19393] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3379.758514][T19393] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xc}, 0x0) [ 3379.850561][T19406] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 12:18:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:49 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000800d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6558000000000000) 12:18:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3380.149253][T19415] netlink: 'syz-executor.2': attribute type 63 has an invalid length. [ 3380.232552][T19421] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 3380.251738][T19415] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:18:50 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xe}, 0x0) 12:18:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6800000000000000) [ 3380.332079][T19415] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3380.506975][T19415] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x6c00000000000000) 12:18:50 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0xf}, 0x0) 12:18:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:50 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000900d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:50 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7400000000000000) 12:18:50 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x10}, 0x0) 12:18:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3381.216304][T19450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3381.339214][T19450] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x7a00000000000000) 12:18:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:51 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x48}, 0x0) 12:18:51 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d0224fc6010003f400a000a00053582c137153e370248038047000e00d1bd", 0x33fe0}], 0x1}, 0x0) 12:18:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) unlink(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) 12:18:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380), 0x40000, &(0x7f00000006c0)=ANY=[@ANYBLOB='mode=00000000000000000000035,mode=00000000000000000000000,mode=00000000000000000000000,fsmagic=0x000000007fffffff,obj_type=bpf\x00,pcr=00000000000000000046,smackfsfloor=bpf\x00,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c686173682c263dabe22c2b4f357375626a5f747970"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x100) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x1000010, &(0x7f0000000540)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES32]) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x14) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001001, &(0x7f0000000a80)=ANY=[@ANYBLOB="576705e28b6f9b05d7fc3ed1d37802c4e667de712ce3730a204e2e335f42eae3248b591495f6e35caf3418a59d8143c48f4e589c9a3e2c50391093e9a32fb949136aa4d15f2f2f7017f4459fbeea21bd6caaddecff696625f255d4deed73a586c0dcf828215dda5516e605d22851c7d4cdb07f30f4b59ded44a729e10c07549d33cb00b80768d08730fb0ad7ac6b2a2512c46d9b91e2861eed4512dbac99256938e61fdab3fb1d61033ca080ef8706aac09ac31e4a3529b401109f7e9beb7ab39a4e852b95149972dd09223024"]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00), 0x5004, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX]) socketpair(0x38, 0x800, 0x8, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x28, &(0x7f00000007c0)=ANY=[@ANYBLOB='mode=00000000000000000000006,mode=00000000000000000000005,mode=00000000000000000000004,mode=00000000000000000000400,mode=00000000000000000000000,mode=000000000000375,obj_type=,permit_directio,\x00']) socketpair(0x1, 0x0, 0xffffffff, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440), 0x5890, 0x0) [ 3381.694915][T19466] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:51 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1, 0x0, 0x4c}, 0x0) [ 3381.783176][T19466] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.2'. 12:18:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000f7bd6efb250009000e000d00400000ff050005002401", 0x2e}], 0x1}, 0x8100000000000000) [ 3487.019656][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 3487.026740][ C1] (detected by 1, t=10502 jiffies, g=508701, q=36) [ 3487.034806][ C1] rcu: All QSes seen, last rcu_preempt kthread activity 10502 (4295285870-4295275368), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 3487.048216][ C1] rcu: rcu_preempt kthread starved for 10502 jiffies! g508701 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 3487.063342][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 3487.073522][ C1] rcu: RCU grace-period kthread stack dump: [ 3487.079439][ C1] task:rcu_preempt state:R running task stack:28032 pid: 14 ppid: 2 flags:0x00004000 [ 3487.090448][ C1] Call Trace: [ 3487.093747][ C1] __schedule+0x93a/0x26f0 [ 3487.098200][ C1] ? io_schedule_timeout+0x140/0x140 [ 3487.103517][ C1] ? debug_object_destroy+0x210/0x210 [ 3487.109040][ C1] schedule+0xd3/0x270 [ 3487.113141][ C1] schedule_timeout+0x14a/0x2a0 [ 3487.118132][ C1] ? usleep_range+0x170/0x170 [ 3487.122826][ C1] ? destroy_timer_on_stack+0x20/0x20 [ 3487.128221][ C1] ? rnbd_clt_map_device.cold+0x764/0x832 [ 3487.133997][ C1] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 3487.139826][ C1] ? prepare_to_swait_event+0xee/0x470 [ 3487.145324][ C1] rcu_gp_kthread+0xd34/0x1980 [ 3487.150132][ C1] ? print_cpu_stall_info+0x6b0/0x6b0 [ 3487.155538][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 3487.162060][ C1] ? __kthread_parkme+0x15f/0x220 [ 3487.167378][ C1] ? print_cpu_stall_info+0x6b0/0x6b0 [ 3487.172795][ C1] kthread+0x3e5/0x4d0 [ 3487.176882][ C1] ? set_kthread_struct+0x130/0x130 [ 3487.182108][ C1] ret_from_fork+0x1f/0x30 [ 3487.186563][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 3487.192912][ C1] Sending NMI from CPU 1 to CPUs 0: [ 3487.199607][ C0] NMI backtrace for cpu 0 [ 3487.199621][ C0] CPU: 0 PID: 19476 Comm: syz-executor.4 Not tainted 5.14.0-rc5-syzkaller #0 [ 3487.199635][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3487.199648][ C0] RIP: 0010:unwind_next_frame+0xa/0x1ce0 [ 3487.199663][ C0] Code: e8 db c4 88 00 48 8b 04 24 eb bd 48 89 0c 24 e8 4c c4 88 00 48 8b 0c 24 e9 72 ff ff ff 0f 1f 00 48 b8 00 00 00 00 00 fc ff df <41> 57 41 56 49 89 fe 41 55 41 54 55 53 48 81 ec a0 00 00 00 48 c7 [ 3487.199684][ C0] RSP: 0018:ffffc90000007708 EFLAGS: 00000202 [ 3487.199700][ C0] RAX: dffffc0000000000 RBX: ffffffff816417f0 RCX: 0000000000000000 [ 3487.199712][ C0] RDX: 1ffff92000000f11 RSI: ffffffff81650843 RDI: ffffc90000007710 [ 3487.199724][ C0] RBP: ffffc90000007798 R08: ffffffff8deaa6da R09: 0000000000000001 [ 3487.199737][ C0] R10: fffff52000000eed R11: 0000000000086088 R12: ffffc900000077c8 [ 3487.199749][ C0] R13: 0000000000000000 R14: ffff88801f2dd4c0 R15: 0000000000000a20 [ 3487.199761][ C0] FS: 00007ff18154d700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 3487.199774][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3487.199785][ C0] CR2: 00000000005131f0 CR3: 0000000078256000 CR4: 00000000001506f0 [ 3487.199798][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3487.199810][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3487.199820][ C0] Call Trace: [ 3487.199825][ C0] [ 3487.199831][ C0] arch_stack_walk+0x7d/0xe0 [ 3487.199839][ C0] ? run_timer_softirq+0xb3/0x1d0 [ 3487.199848][ C0] stack_trace_save+0x8c/0xc0 [ 3487.199856][ C0] ? stack_trace_consume_entry+0x160/0x160 [ 3487.199864][ C0] ? mark_lock+0xef/0x17b0 [ 3487.199876][ C0] kasan_save_stack+0x1b/0x40 [ 3487.199883][ C0] ? kasan_save_stack+0x1b/0x40 [ 3487.199892][ C0] ? __kasan_slab_alloc+0x84/0xa0 [ 3487.199900][ C0] ? kmem_cache_alloc+0x285/0x4a0 [ 3487.199908][ C0] ? skb_clone+0x170/0x3c0 [ 3487.199916][ C0] ? hsr_create_tagged_frame+0x173/0xb60 [ 3487.199925][ C0] ? hsr_forward_skb+0x84c/0x1620 [ 3487.199933][ C0] ? send_hsr_supervision_frame+0x60b/0x8d0 [ 3487.199942][ C0] ? hsr_announce+0x109/0x330 [ 3487.199950][ C0] ? call_timer_fn+0x1a5/0x6b0 [ 3487.199958][ C0] ? __run_timers.part.0+0x675/0xa20 [ 3487.199967][ C0] ? run_timer_softirq+0xb3/0x1d0 [ 3487.199976][ C0] ? tick_program_event+0xb4/0x140 [ 3487.199985][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3487.199994][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 3487.200002][ C0] ? sched_clock_cpu+0x15/0x1f0 [ 3487.200010][ C0] ? mark_held_locks+0x9f/0xe0 [ 3487.200018][ C0] ? irqtime_account_irq+0x187/0x2d0 [ 3487.200027][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3487.200037][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 3487.200046][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3487.200055][ C0] ? skb_clone+0x153/0x3c0 [ 3487.200062][ C0] ? kasan_unpoison+0x3c/0x60 [ 3487.200070][ C0] __kasan_slab_alloc+0x84/0xa0 [ 3487.200079][ C0] kmem_cache_alloc+0x285/0x4a0 [ 3487.200086][ C0] skb_clone+0x170/0x3c0 [ 3487.200094][ C0] hsr_create_tagged_frame+0x173/0xb60 [ 3487.200104][ C0] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 3487.200113][ C0] ? hsr_register_frame_out+0x1da/0x2a0 [ 3487.200121][ C0] hsr_forward_skb+0x84c/0x1620 [ 3487.200132][ C0] ? prp_drop_frame+0xa0/0x150 [ 3487.200142][ C0] ? prp_fill_frame_info+0x6b0/0x6b0 [ 3487.200151][ C0] ? memset+0x20/0x40 [ 3487.200156][ C0] ? __skb_pad+0x247/0x5f0 [ 3487.200163][ C0] send_hsr_supervision_frame+0x60b/0x8d0 [ 3487.200170][ C0] ? send_hsr_supervision_frame+0x8d0/0x8d0 [ 3487.200177][ C0] hsr_announce+0x109/0x330 [ 3487.200184][ C0] ? send_hsr_supervision_frame+0x8d0/0x8d0 [ 3487.200191][ C0] call_timer_fn+0x1a5/0x6b0 [ 3487.200197][ C0] ? add_timer_on+0x4a0/0x4a0 [ 3487.200203][ C0] ? send_hsr_supervision_frame+0x8d0/0x8d0 [ 3487.200211][ C0] __run_timers.part.0+0x675/0xa20 [ 3487.200217][ C0] ? call_timer_fn+0x6b0/0x6b0 [ 3487.200224][ C0] ? lapic_next_event+0x4d/0x80 [ 3487.200230][ C0] run_timer_softirq+0xb3/0x1d0 [ 3487.200237][ C0] __do_softirq+0x29b/0x9c2 [ 3487.200243][ C0] __irq_exit_rcu+0x16e/0x1c0 [ 3487.200249][ C0] irq_exit_rcu+0x5/0x20 [ 3487.200255][ C0] sysvec_apic_timer_interrupt+0x93/0xc0 [ 3487.200261][ C0] [ 3487.200267][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3487.200275][ C0] RIP: 0010:do_raw_spin_lock+0x17b/0x2b0 [ 3487.200287][ C0] Code: 0f b6 14 02 4c 89 e0 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 d9 00 00 00 4c 89 ea 44 89 75 08 48 b8 00 00 00 00 00 fc ff df <48> c1 ea 03 65 4c 8b 24 25 00 f0 01 00 80 3c 02 00 0f 85 e4 00 00 [ 3487.200305][ C0] RSP: 0018:ffffc90002e3f9c8 EFLAGS: 00000246 [ 3487.200317][ C0] RAX: dffffc0000000000 RBX: 1ffff920005c7f3a RCX: ffffffff815b9610 [ 3487.200327][ C0] RDX: ffff88801a5677c8 RSI: 0000000000000004 RDI: ffffc90002e3f9f0 [ 3487.200338][ C0] RBP: ffff88801a5677b8 R08: 0000000000000001 R09: 0000000000000003 [ 3487.200348][ C0] R10: fffff520005c7f3e R11: 0000000000000000 R12: ffff88801a5677c0 [ 3487.200358][ C0] R13: ffff88801a5677c8 R14: 0000000000000000 R15: 0000000000000000 [ 3487.200366][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 3487.200374][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 3487.200380][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 3487.200387][ C0] __find_get_block+0x4df/0xdb0 [ 3487.200394][ C0] find_inode_bit+0x230/0x580 [ 3487.200401][ C0] __ext4_new_inode+0xc4d/0x5c40 [ 3487.200408][ C0] ? __dquot_initialize+0x295/0xbe0 [ 3487.200416][ C0] ? ext4_mark_inode_used+0x1a70/0x1a70 [ 3487.200423][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3487.200431][ C0] ? mark_held_locks+0x9f/0xe0 [ 3487.200438][ C0] ? ext4_mkdir+0x6c4/0xb20 [ 3487.200444][ C0] ext4_mkdir+0x33a/0xb20 [ 3487.200452][ C0] ? security_inode_permission+0xa8/0xf0 [ 3487.200459][ C0] ? ext4_rmdir+0xf10/0xf10 [ 3487.200466][ C0] ? security_inode_permission+0xc5/0xf0 [ 3487.200474][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3487.200482][ C0] vfs_mkdir+0x52e/0x760 [ 3487.200489][ C0] do_mkdirat+0x284/0x310 [ 3487.200495][ C0] ? user_path_create+0xf0/0xf0 [ 3487.200503][ C0] ? syscall_enter_from_user_mode+0x21/0x70 [ 3487.200511][ C0] do_syscall_64+0x35/0xb0 [ 3487.200518][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3487.200526][ C0] RIP: 0033:0x4665e9 [ 3487.200539][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3487.200559][ C0] RSP: 002b:00007ff18154d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3487.200582][ C0] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 3487.200592][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 3487.200602][ C0] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 3487.200613][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 3487.200623][ C0] R13: 00007ffe8aaabc8f R14: 00007ff18154d300 R15: 0000000000022000 [ 3487.204059][T19474] [ 3487.885826][T19474] ================================ [ 3487.890926][T19474] WARNING: inconsistent lock state [ 3487.896036][T19474] 5.14.0-rc5-syzkaller #0 Not tainted [ 3487.901432][T19474] -------------------------------- [ 3487.906541][T19474] inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage. [ 3487.913385][T19474] syz-executor.1/19474 [HC0[0]:SC0[0]:HE0:SE1] takes: [ 3487.920154][T19474] ffffffff8b9850d8 (rcu_node_0){?.-.}-{2:2}, at: rcu_sched_clock_irq+0xc9a/0x20c0 [ 3487.929490][T19474] {IN-HARDIRQ-W} state was registered at: [ 3487.935211][T19474] lock_acquire+0x1ab/0x510 [ 3487.939848][T19474] _raw_spin_lock_irqsave+0x39/0x50 [ 3487.945142][T19474] rcu_report_exp_cpu_mult+0x1c/0x280 [ 3487.950610][T19474] flush_smp_call_function_queue+0x34b/0x640 [ 3487.956691][T19474] __sysvec_call_function_single+0x95/0x3d0 [ 3487.962682][T19474] sysvec_call_function_single+0x8e/0xc0 [ 3487.968415][T19474] asm_sysvec_call_function_single+0x12/0x20 [ 3487.974504][T19474] bad_range+0xcf/0x300 [ 3487.979202][T19474] get_page_from_freelist+0xa51/0x2f80 [ 3487.984758][T19474] __alloc_pages+0x1b2/0x500 [ 3487.989452][T19474] alloc_pages+0x18c/0x2a0 [ 3487.994021][T19474] allocate_slab+0x32e/0x4b0 [ 3487.998869][T19474] ___slab_alloc+0x473/0x7b0 [ 3488.003574][T19474] __slab_alloc.constprop.0+0xa7/0xf0 [ 3488.009297][T19474] kmem_cache_alloc+0x3e1/0x4a0 [ 3488.014282][T19474] __alloc_file+0x21/0x280 [ 3488.018908][T19474] alloc_empty_file+0x6d/0x170 [ 3488.024116][T19474] path_openat+0xde/0x27f0 [ 3488.028837][T19474] do_filp_open+0x1aa/0x400 [ 3488.033840][T19474] do_open_execat+0x116/0x690 [ 3488.038613][T19474] bprm_execve+0x48c/0x19b0 [ 3488.043210][T19474] kernel_execve+0x370/0x460 [ 3488.048074][T19474] call_usermodehelper_exec_async+0x2e3/0x580 [ 3488.054240][T19474] ret_from_fork+0x1f/0x30 [ 3488.058751][T19474] irq event stamp: 10063736 [ 3488.063242][T19474] hardirqs last enabled at (10063735): [] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3488.074284][T19474] hardirqs last disabled at (10063736): [] sysvec_apic_timer_interrupt+0xb/0xc0 [ 3488.085157][T19474] softirqs last enabled at (15916): [] __irq_exit_rcu+0x16e/0x1c0 [ 3488.094634][T19474] softirqs last disabled at (14155): [] __irq_exit_rcu+0x16e/0x1c0 [ 3488.104106][T19474] [ 3488.104106][T19474] other info that might help us debug this: [ 3488.112568][T19474] Possible unsafe locking scenario: [ 3488.112568][T19474] [ 3488.120099][T19474] CPU0 [ 3488.123374][T19474] ---- [ 3488.126912][T19474] lock(rcu_node_0); [ 3488.130909][T19474] [ 3488.134464][T19474] lock(rcu_node_0); [ 3488.138974][T19474] [ 3488.138974][T19474] *** DEADLOCK *** [ 3488.138974][T19474] [ 3488.147114][T19474] 4 locks held by syz-executor.1/19474: [ 3488.152662][T19474] #0: ffff888147fb8460 (sb_writers#5){.+.+}-{0:0}, at: filename_create+0x104/0x490 [ 3488.162354][T19474] #1: ffff8880903f3660 (&type->i_mutex_dir_key#4/1){+.+.}-{3:3}, at: filename_create+0x15a/0x490 [ 3488.173098][T19474] #2: ffff88801a5677d0 (&mapping->private_lock){+.+.}-{2:2}, at: __find_get_block+0x4df/0xdb0 [ 3488.183595][T19474] #3: ffffffff8b9850d8 (rcu_node_0){?.-.}-{2:2}, at: rcu_sched_clock_irq+0xc9a/0x20c0 [ 3488.193305][T19474] [ 3488.193305][T19474] stack backtrace: [ 3488.199303][T19474] CPU: 1 PID: 19474 Comm: syz-executor.1 Not tainted 5.14.0-rc5-syzkaller #0 [ 3488.208161][T19474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3488.218217][T19474] Call Trace: [ 3488.221512][T19474] dump_stack_lvl+0xcd/0x134 [ 3488.226323][T19474] mark_lock.cold+0x61/0x8e [ 3488.230848][T19474] ? lock_chain_count+0x20/0x20 [ 3488.235717][T19474] ? lock_chain_count+0x20/0x20 [ 3488.241377][T19474] ? mark_lock+0xef/0x17b0 [ 3488.246257][T19474] ? mark_lock+0xef/0x17b0 [ 3488.250778][T19474] ? lock_chain_count+0x20/0x20 [ 3488.255667][T19474] mark_held_locks+0x9f/0xe0 [ 3488.260274][T19474] lockdep_hardirqs_on_prepare+0x135/0x400 [ 3488.266182][T19474] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3488.272349][T19474] trace_hardirqs_on+0x5b/0x1c0 [ 3488.277242][T19474] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3488.283245][T19474] RIP: 0010:__pv_queued_spin_lock_slowpath+0x3ba/0xb40 [ 3488.290117][T19474] Code: eb c6 45 01 01 41 bc 00 80 00 00 48 c1 e9 03 83 e3 07 41 be 01 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 2c 01 eb 0c f3 90 <41> 83 ec 01 0f 84 72 04 00 00 41 0f b6 45 00 38 d8 7f 08 84 c0 0f [ 3488.309912][T19474] RSP: 0018:ffffc900032ef8f0 EFLAGS: 00000206 [ 3488.315988][T19474] RAX: 0000000000000003 RBX: 0000000000000000 RCX: 1ffff110034acef7 [ 3488.324421][T19474] RDX: 0000000000000001 RSI: ffffffff817bd271 RDI: ffffffff81332591 [ 3488.332405][T19474] RBP: ffff88801a5677b8 R08: 0000000000000001 R09: 0000000000000001 [ 3488.340396][T19474] R10: ffffffff817bd239 R11: 0000000000000000 R12: 0000000000003498 [ 3488.348375][T19474] R13: ffffed10034acef7 R14: 0000000000000001 R15: ffff8880b9d527c0 [ 3488.356440][T19474] ? trace_hardirqs_on+0x19/0x1c0 [ 3488.361570][T19474] ? trace_hardirqs_on+0x51/0x1c0 [ 3488.366603][T19474] ? kvm_wait+0x51/0xf0 [ 3488.370776][T19474] ? pv_hash+0x100/0x100 [ 3488.375028][T19474] ? lock_release+0x720/0x720 [ 3488.379712][T19474] do_raw_spin_lock+0x200/0x2b0 [ 3488.384570][T19474] ? rwlock_bug.part.0+0x90/0x90 [ 3488.389530][T19474] __find_get_block+0x4df/0xdb0 [ 3488.394412][T19474] find_inode_bit+0x230/0x580 [ 3488.399128][T19474] __ext4_new_inode+0xc4d/0x5c40 [ 3488.404111][T19474] ? __dquot_initialize+0xe9/0xbe0 [ 3488.409231][T19474] ? ext4_mark_inode_used+0x1a70/0x1a70 [ 3488.414797][T19474] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3488.420998][T19474] ? ext4_mkdir+0xb0/0xb20 [ 3488.425427][T19474] ? ext4_mkdir+0x6c4/0xb20 [ 3488.429946][T19474] ext4_mkdir+0x33a/0xb20 [ 3488.434299][T19474] ? ext4_rmdir+0xf10/0xf10 [ 3488.438813][T19474] ? bpf_lsm_inode_symlink+0x10/0x10 [ 3488.444141][T19474] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3488.450398][T19474] vfs_mkdir+0x52e/0x760 [ 3488.454652][T19474] do_mkdirat+0x284/0x310 [ 3488.459006][T19474] ? user_path_create+0xf0/0xf0 [ 3488.463862][T19474] ? syscall_enter_from_user_mode+0x21/0x70 [ 3488.469797][T19474] do_syscall_64+0x35/0xb0 [ 3488.474225][T19474] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3488.480132][T19474] RIP: 0033:0x4665e9 [ 3488.484116][T19474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3488.503732][T19474] RSP: 002b:00007fb42b675188 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3488.512155][T19474] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 3488.520140][T19474] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 3488.528206][T19474] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 3488.536190][T19474] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 3488.544190][T19474] R13: 00007fffbe33c34f R14: 00007fb42b675300 R15: 0000000000022000