f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1627.429825][T23715] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1627.545018][T23715] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1628.056862][T23753] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1628.065068][T23753] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:07 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c2b940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1629.075577][T23777] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1629.125390][T23777] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1629.493212][T23801] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1629.509235][T23801] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:08 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050382c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:08 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:08 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60050002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:08 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:09 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1630.738826][T23805] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1630.813281][T23805] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1631.278351][T23841] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1631.287135][T23841] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:10 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c2d940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:10 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1631.974540][T23876] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1631.991643][T23876] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1632.321052][T23893] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1632.329640][T23893] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:11 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050482c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:11 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:11 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60060002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:11 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1633.176527][T23899] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1633.184729][T23899] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1633.956534][T23930] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1633.965066][T23930] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:13 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c2e940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1634.680952][T23962] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1634.703318][T23962] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:14 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:14 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60070002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1635.063512][T23979] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1635.071884][T23979] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1636.465068][T23998] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1636.721511][T23998] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1637.128270][T24020] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1637.138101][T24020] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:16 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c30940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1637.801831][T24022] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1637.813828][T24022] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1638.123894][T24071] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1638.135391][T24071] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:17 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050682c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:17 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60080002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(0x0, 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1639.376418][T24109] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1639.385098][T24109] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:18 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c58940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1640.323229][T24146] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1640.338595][T24146] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:19 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050782c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(0x0, 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:20 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60090002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(0x0, 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1641.411399][T24146] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1641.421824][T24146] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1642.101798][T24177] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1642.114092][T24177] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:21 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c64940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1642.286736][ T26] audit: type=1804 audit(1632624981.357:97): pid=24228 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/newroot/1182/file0/bus" dev="sda1" ino=13872 res=1 errno=0 [ 1642.935946][T24205] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1642.960680][T24205] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1643.300567][T24229] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1643.310205][T24229] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:22 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050882c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:22 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc600a0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1643.484665][ T26] audit: type=1804 audit(1632624982.547:98): pid=24267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/newroot/1183/file0/bus" dev="sda1" ino=13872 res=1 errno=0 02:56:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1643.958984][ T26] audit: type=1804 audit(1632624983.027:99): pid=24277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/newroot/1184/file0/bus" dev="sda1" ino=13872 res=1 errno=0 02:56:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1644.694694][T24241] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1644.794421][T24241] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1645.348069][T24268] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:24 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c69940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1646.069214][T24274] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1646.085255][T24274] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1646.385996][T24298] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1646.723023][T24306] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1646.743557][T24306] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:26 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050982c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1647.042512][T24324] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1647.051318][T24324] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:26 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc600b0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(0x0, 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1648.684961][T24379] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1648.705729][T24379] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:27 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6c940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(0x0, &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(0x0, 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1649.765195][T24382] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1649.787770][T24382] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1650.165020][T24402] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1650.183483][T24402] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:29 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050a82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(0x0, 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(0x0, &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1650.465334][T24411] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1650.484702][T24411] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:30 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc600c0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(0x0, &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1651.604374][T24424] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1651.623638][T24424] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1651.722988][ T26] audit: type=1804 audit(1632624990.787:100): pid=24497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/newroot/1718/file0/bus" dev="sda1" ino=13916 res=1 errno=0 02:56:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1652.675118][T24429] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1652.696720][T24429] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1653.067784][T24471] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1653.076516][T24471] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:32 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6f940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1653.227715][ T26] audit: type=1804 audit(1632624992.297:101): pid=24534 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/newroot/1719/file0/bus" dev="sda1" ino=13916 res=1 errno=0 [ 1653.903244][T24478] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1653.923021][T24478] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1654.255758][T24500] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1654.264014][T24500] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:33 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050b82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1654.444566][ T26] audit: type=1804 audit(1632624993.508:102): pid=24569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/newroot/1720/file0/bus" dev="sda1" ino=13916 res=1 errno=0 [ 1655.419932][T24520] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1655.455757][T24520] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:35 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc600d0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1655.873437][T24536] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1655.883639][T24536] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1657.182409][T24553] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1657.227691][T24553] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1657.547560][T24573] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1657.556296][T24573] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:36 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c70940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, 0x0, 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1658.527589][T24575] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1658.540863][T24575] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1658.860533][T24611] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1658.869306][T24611] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:38 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050c82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(0x0, &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, 0x0, 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1660.346701][T24634] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1660.696644][T24634] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1661.054662][T24655] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1661.064177][T24655] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:40 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc600e0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), 0x0, 0x0, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, 0x0, 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(0x0, &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(0x0, &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1662.843899][T24658] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1662.858610][T24658] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:42 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c73940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), 0x0, 0x0, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1663.360635][T24694] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1663.379687][T24694] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1664.690082][T24733] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1664.701917][T24733] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:43 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050d82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), 0x0, 0x0, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1666.067761][T24734] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1666.079627][T24734] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:45 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60110002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380), 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1666.467031][T24769] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1666.483220][T24769] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380), 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1668.156680][T24800] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1668.191086][T24800] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1668.486519][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.492956][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 [ 1668.725703][T24777] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1668.749777][T24777] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1669.059821][T24804] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1669.068722][T24804] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:48 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c75940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1670.588136][T24840] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1670.598779][T24840] netlink: 'syz-executor.2': attribute type 23 has an invalid length. [ 1670.608388][T24840] netlink: 151480 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1670.619820][T24889] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1670.632364][T24889] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:49 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050e82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380), 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:49 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60120002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1672.895276][T24896] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1673.107922][T24896] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1673.931268][T24918] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1673.941241][T24918] netlink: 'syz-executor.2': attribute type 23 has an invalid length. [ 1673.953715][T24918] netlink: 151480 bytes leftover after parsing attributes in process `syz-executor.2'. 02:56:53 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c78940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1673.977361][T24922] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1673.987503][T24922] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1675.149120][T24943] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1675.172799][T24943] netlink: 'syz-executor.2': attribute type 23 has an invalid length. [ 1675.201449][T24943] netlink: 151480 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1675.214693][T24953] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1675.238782][T24953] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1675.578738][T24980] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1675.587208][T24980] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:54 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00050f82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380), 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:54 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60140002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380), 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1678.046496][T24985] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1678.138038][T24985] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1678.889547][T25017] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1678.899662][T25017] netlink: 'syz-executor.2': attribute type 23 has an invalid length. [ 1678.908417][T25017] netlink: 151480 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1678.918820][T25019] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1678.940311][T25019] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:56:58 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394090424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380), 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1680.266787][T25052] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1680.310935][T25052] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1680.684867][T25078] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1680.693157][T25078] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:56:59 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051082c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:59 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc602f0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:56:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:56:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1683.199347][T25097] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1683.439923][T25097] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1684.068648][T25116] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1684.077530][T25116] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:03 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940e0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1685.285894][T25115] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1685.299322][T25115] netlink: 212892 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1685.761493][T25125] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1685.770321][T25125] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1686.069426][T25153] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1686.078032][T25153] netlink: 212892 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:05 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051182c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1687.031759][T25176] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1687.040152][T25176] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:06 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60350002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1687.922559][T25180] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1687.959954][T25180] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:08 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394100424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1689.220379][T25220] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1689.239648][T25220] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1689.954158][T25236] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1689.975979][T25236] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:09 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051282c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000000000000003,allow_other,default_']) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1690.357793][T25243] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1690.373544][T25243] netlink: 212884 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:10 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc605b0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1691.010806][T25293] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1691.033678][T25293] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1692.303502][T25308] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1692.311708][T25308] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1692.808148][T25326] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1692.824106][T25326] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:11 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394120424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1693.846580][T25344] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1693.864344][T25344] netlink: 212848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1694.210940][T25328] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1694.221511][T25328] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:13 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051382c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1694.538115][T25381] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1694.546804][T25381] netlink: 212848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1695.078142][T25400] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1695.086693][T25400] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:14 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc606c0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1696.296367][T25403] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1696.317863][T25403] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1696.769967][T25441] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1696.783261][T25441] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:15 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394280424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1697.680242][T25463] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1697.695005][T25463] netlink: 212832 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1698.056737][T25473] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1698.077572][T25473] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1698.399400][T25511] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1698.408947][T25511] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:17 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051482c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:17 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60586502400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1699.643058][T25529] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1699.728386][T25529] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1700.635847][T25556] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1700.645888][T25556] netlink: 186996 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:19 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394330424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1701.304505][T25562] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1701.325091][T25562] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1701.736106][T25578] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1701.756485][T25578] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1702.061194][T25617] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1702.071089][T25617] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:21 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60008102400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:21 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1704.020335][T25641] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1704.066378][T25641] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1704.750080][T25660] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1704.760015][T25660] netlink: 179916 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:23 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394350424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1705.678813][T25665] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1705.693994][T25665] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1706.046964][T25707] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1706.066106][T25707] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1706.373726][T25728] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1706.384755][T25728] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:25 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051682c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:25 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100202400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1707.420166][T25732] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1707.719081][T25732] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1708.471979][T25772] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1708.484702][T25772] netlink: 212412 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:27 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63945b0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1709.149832][T25776] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1709.174189][T25776] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1709.490975][T25805] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1709.512117][T25805] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1709.844604][T25826] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1709.853930][T25826] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:29 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051782c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:29 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100302400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:30 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394630424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1711.196315][T25868] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1711.213557][T25868] netlink: 212156 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1712.931396][T25875] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1712.964120][T25875] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:32 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051882c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:32 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100402400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1713.281714][T25903] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1713.308622][T25903] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1715.919627][T25914] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1715.940744][T25914] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1716.563977][T25946] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1716.576446][T25946] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:35 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63946c0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1717.779453][T25941] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1717.792081][T25941] netlink: 211900 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1718.182064][T25964] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1718.226573][T25964] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1718.551597][T26004] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1718.560767][T26004] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:57:37 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051982c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:37 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100502400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1722.022067][T26020] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1722.053091][T26020] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1722.573515][T26047] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1722.584412][T26047] netlink: 211644 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:41 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0224fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1723.868882][T26057] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1723.901606][T26057] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1724.234937][T26058] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1724.254590][T26058] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1729.711955][T26106] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1729.720167][T26106] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1729.739126][T26110] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1729.771865][T26110] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1729.942593][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 1729.948930][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 02:57:49 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051a82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:49 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100602400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:49 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0324fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1730.347817][T26157] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1730.357256][T26157] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff29", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1731.429488][T26177] fuse: Unknown parameter 'qTe÷¬ô¥Àpk7' 02:57:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff29", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1732.705187][T26197] fuse: Unknown parameter 'qTe÷¬ô¥Àpk7' [ 1733.666330][T26150] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1733.681834][T26150] netlink: 157848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1734.108914][T26153] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1734.120955][T26153] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1734.137598][T26168] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1734.193179][T26168] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:57:53 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051b82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff29", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:53 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100702400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:57:53 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0524fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1734.811924][T26248] fuse: Unknown parameter 'qTe÷¬ô¥Àpk7' 02:57:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1735.544807][T26244] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1735.574236][T26244] netlink: 211132 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:57:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1743.740752][T26249] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1743.748971][T26249] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1744.285325][T26242] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1744.294925][T26242] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:58:03 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051c82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:03 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100802400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1744.329775][T26275] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1744.598702][T26275] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1745.299153][T26323] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 02:58:04 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0624fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8d", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1745.350897][T26323] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8d", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1753.960509][T26316] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1753.968711][T26316] netlink: 210876 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:13 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051d82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8d", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:14 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100902400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:14 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0724fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1755.213195][T26386] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1755.225842][T26386] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f0", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f0", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1758.622897][T26401] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1758.632734][T26401] netlink: 210620 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:17 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00051e82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f0", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x80019e) 02:58:19 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100a02400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x80019e) 02:58:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:19 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0824fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x80019e) [ 1761.383953][T26459] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1761.406863][T26459] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1767.849563][T26488] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1767.857776][T26488] netlink: 210364 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:27 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052182c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) [ 1768.464518][T26492] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1768.476427][T26492] netlink: 210364 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1769.870118][T26541] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1769.878761][T26541] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:29 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100b02400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b667364"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) 02:58:30 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0c24fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) 02:58:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b667364"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1771.425420][T26574] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1771.469758][T26574] netlink: 210108 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:31 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052282c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) 02:58:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b667364"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1773.516323][T26578] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1773.545667][T26578] netlink: 210108 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1773.923966][T26611] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1773.936767][T26611] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:33 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100e02400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) [ 1775.130147][T26635] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 02:58:34 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0e24fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) 02:58:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1775.811647][T26635] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1776.814308][T26661] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1776.822740][T26661] netlink: 209340 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:35 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052382c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) [ 1778.222619][T26662] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1778.234552][T26662] netlink: 209340 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1778.610700][T26714] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1778.627404][T26714] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:37 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60103502400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:37 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d1024fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1781.117417][T26719] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1781.262106][T26719] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1782.087085][T26753] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1782.096522][T26753] netlink: 199356 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:41 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052482c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1783.415905][T26759] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1783.430434][T26759] netlink: 199356 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1783.869203][T26812] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1783.877409][T26812] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:43 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60104802400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:44 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d1224fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1785.381909][T26814] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1785.410772][T26814] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1786.925771][T26849] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1786.936979][T26849] netlink: 194492 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:46 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1788.248642][T26884] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1788.256853][T26884] netlink: 194492 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1788.778531][T26910] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1788.786731][T26910] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:48 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60104c02400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:48 executing program 3: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d1024fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:48 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d1424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1789.863061][T26912] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1789.878613][T26912] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1791.361102][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 1791.367664][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 02:58:50 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052682c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1791.528127][T26950] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1791.553550][T26950] netlink: 193468 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e242"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1792.898446][T26999] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1792.918270][T26999] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:52 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60106002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e242"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:53 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d2824fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e242"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1795.673165][T27027] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1795.695009][T27027] netlink: 188348 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1796.281691][T27032] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1796.302198][T27032] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1796.651638][T27038] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1796.660226][T27038] netlink: 188348 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:55 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052782c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e242"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1798.238487][T27105] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1798.246703][T27105] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:57 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60106802400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:58 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d3324fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:58:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x80019e) 02:58:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:58:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e242"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1799.596711][T27112] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1799.967373][T27112] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1801.239543][T27135] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1801.249724][T27135] netlink: 186300 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:00 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052882c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x80019e) 02:59:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e242"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1802.774162][T27186] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1802.818369][T27186] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:59:02 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60106c02400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x80019e) 02:59:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e242"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:02 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d3524fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) 02:59:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:03 executing program 3: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60106802400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1805.790999][T27186] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1805.800239][T27186] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1806.174952][T27217] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1806.187348][T27217] netlink: 185276 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) 02:59:05 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052982c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) [ 1808.172292][T27236] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 1808.184515][T27236] netlink: 186300 bytes leftover after parsing attributes in process `syz-executor.3'. 02:59:07 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60107402400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) 02:59:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1809.797548][T27272] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1809.805756][T27272] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:59:09 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d5b24fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) 02:59:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) 02:59:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) 02:59:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x0) [ 1812.252656][T27281] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1812.393807][T27281] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1812.738545][T27300] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1812.746767][T27300] netlink: 183228 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:11 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052a82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1813.707389][T27312] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1813.715599][T27312] netlink: 183228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1814.135045][T27378] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1814.144483][T27378] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:59:13 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60107a02400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) 02:59:13 executing program 1: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052882c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:13 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d6c24fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1815.320686][T27381] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 02:59:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1815.403409][T27381] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:59:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:17 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052b82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1818.282174][T27417] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1818.295060][T27417] netlink: 181692 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1818.900796][T27412] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 1818.928539][T27412] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 02:59:18 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100003400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1819.837293][T27483] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1819.845510][T27483] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:59:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:20 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0428fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1822.119130][T27499] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:21 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052c82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:22 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100005400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1823.639554][T27534] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1823.654078][T27534] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:59:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:24 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0433fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:24 executing program 3: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60106802400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESDEC=0x0, @ANYBLOB]) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}]}, 0x14, 0x0) fallocate(r0, 0x0, 0x0, 0x80019e) [ 1825.073492][T27565] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1825.087549][T27565] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:59:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1827.338285][T27589] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 1827.396698][T27589] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:26 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052d82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1828.134756][T27612] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 1828.152251][T27612] netlink: 186300 bytes leftover after parsing attributes in process `syz-executor.3'. 02:59:27 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100006400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1830.319074][T27619] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1830.366472][T27619] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1830.879946][T27650] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1830.896731][T27650] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1831.178195][T27620] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1831.187762][T27620] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1831.497764][T27669] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 1831.505899][T27669] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:30 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0435fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:30 executing program 3: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60106802400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1832.950023][T27655] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1832.994304][T27655] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1833.562834][T27682] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 1833.573988][T27682] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:32 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052e82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1834.339593][T27742] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1834.356416][T27742] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:59:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:33 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100007400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1836.128204][T27739] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 1836.159035][T27739] netlink: 186300 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1836.899842][T27765] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1836.914864][T27765] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1837.307316][T27783] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 1837.315567][T27783] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 02:59:36 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d045bfc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) 02:59:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1838.926581][T27874] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1838.934786][T27874] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 02:59:38 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00052f82c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) 02:59:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:38 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100009400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=0000000000000000010000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=0000000000000000010000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) 02:59:44 executing program 0: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d046cfc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=0000000000000000010000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:44 executing program 2: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100014400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) 02:59:44 executing program 4: getdents(0xffffffffffffff9c, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0xff, 0x6, 0x6, 0x0, 0x40, 0x80, 0x37fbd124257bd8df, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x3, @perf_bp={&(0x7f0000000600), 0x5}, 0x10000, 0x17063944, 0x5, 0x2, 0x4, 0x0, 0x5f, 0x0, 0x10001, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x3, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) dup(r1) dup2(r0, 0xffffffffffffffff) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0xc05c5340, &(0x7f00000001c0)) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0xc05c5340, &(0x7f00000001c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053082c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x9, 0xd50}, 0x8) [ 1846.334326][T27934] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 02:59:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) 02:59:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) 02:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340), &(0x7f0000000380)={'0000000000000000000000000000000', 0x32}, 0x20, 0x1) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) fstat(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x100010, &(0x7f0000000880)=ANY=[@ANYBLOB="715465f712ac07f4a5c0706b372ca8ae27b879c6682948784bd9fbf8dec834a3da541ec1a80088f6d328a72afa32c3d5af682e8193f1d22e396bf83d4f73f1d521cc3323b81088ab74b464f62f2f7e237303ba559fa1be1e03a77c6f712db6181f149059c075eb37f670736271bae92d0968deb9fe3d76a73aff2973fc636c4c4a4479be259f00bd27dd0a0000006ba8492ea25f410d27992e8da2a8acf3f06e8afc55f4", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6f626a5f757365723d255b2c275e9c2c61707072616973652c66736d616769633d3078303030303030303030303030303030302c646f6e745f61707072616973652c736d61636b66736465663d215a006673636f6e746578743d726f6f742c61707072616973652c007d70532d9f43454594217b0f97a961e24253"]) fsetxattr$security_capability(r0, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x4, 0x5}, {0x8}]}, 0x14, 0x0) fallocate(r0, 0x100000011, 0x0, 0x80019e) [ 1852.835837][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 1852.842202][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 [ 1857.381186][T27940] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 1857.391997][T27940] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1964.169801][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1964.176579][ C1] rcu: 1-...!: (10500 ticks this GP) idle=50b/1/0x4000000000000000 softirq=138379/138379 fqs=1 [ 1964.188537][ C1] (t=10502 jiffies g=271053 q=14) [ 1964.193760][ C1] rcu: rcu_preempt kthread starved for 10501 jiffies! g271053 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 1964.205233][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1964.215477][ C1] rcu: RCU grace-period kthread stack dump: [ 1964.221391][ C1] task:rcu_preempt state:R running task stack:28696 pid: 14 ppid: 2 flags:0x00004000 [ 1964.232193][ C1] Call Trace: [ 1964.235488][ C1] __schedule+0x940/0x26f0 [ 1964.239947][ C1] ? io_schedule_timeout+0x140/0x140 [ 1964.245700][ C1] ? debug_object_destroy+0x210/0x210 [ 1964.252821][ C1] schedule+0xd3/0x270 [ 1964.256910][ C1] schedule_timeout+0x14a/0x2a0 [ 1964.261781][ C1] ? usleep_range+0x170/0x170 [ 1964.266477][ C1] ? destroy_timer_on_stack+0x20/0x20 [ 1964.271873][ C1] ? parse_reply_info.cold+0x62/0xbf [ 1964.277195][ C1] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 1964.283020][ C1] ? prepare_to_swait_event+0xee/0x470 [ 1964.288549][ C1] rcu_gp_fqs_loop+0x186/0x800 [ 1964.293338][ C1] ? force_qs_rnp+0x760/0x760 [ 1964.298036][ C1] ? rcu_gp_init+0x906/0x12a0 [ 1964.302739][ C1] rcu_gp_kthread+0x1de/0x320 [ 1964.307433][ C1] ? rcu_gp_init+0x12a0/0x12a0 [ 1964.312221][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1964.318483][ C1] ? __kthread_parkme+0x15f/0x220 [ 1964.323592][ C1] ? rcu_gp_init+0x12a0/0x12a0 [ 1964.328382][ C1] kthread+0x3e5/0x4d0 [ 1964.332470][ C1] ? set_kthread_struct+0x130/0x130 [ 1964.337690][ C1] ret_from_fork+0x1f/0x30 [ 1964.342166][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 1964.348540][ C1] NMI backtrace for cpu 1 [ 1964.352871][ C1] CPU: 1 PID: 27934 Comm: syz-executor.2 Not tainted 5.15.0-rc2-syzkaller #0 [ 1964.361737][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1964.371798][ C1] Call Trace: [ 1964.375084][ C1] [ 1964.377935][ C1] dump_stack_lvl+0xcd/0x134 [ 1964.382545][ C1] nmi_cpu_backtrace.cold+0x47/0x144 [ 1964.387847][ C1] ? lapic_can_unplug_cpu+0x80/0x80 [ 1964.393214][ C1] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 1964.399288][ C1] rcu_check_gp_kthread_starvation.cold+0x1fb/0x200 [ 1964.405906][ C1] rcu_sched_clock_irq.cold+0x98/0x746 [ 1964.411390][ C1] ? find_held_lock+0x2d/0x110 [ 1964.416187][ C1] ? rcutree_dead_cpu+0x30/0x30 [ 1964.421056][ C1] ? tick_sched_timer+0x2b/0x2d0 [ 1964.426163][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 1964.431137][ C1] update_process_times+0x16d/0x200 [ 1964.436463][ C1] tick_sched_handle+0x9b/0x180 [ 1964.441337][ C1] tick_sched_timer+0x1b0/0x2d0 [ 1964.446210][ C1] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 1964.451781][ C1] __hrtimer_run_queues+0x1c0/0xe50 [ 1964.457097][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1964.463094][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1964.469191][ C1] hrtimer_interrupt+0x31c/0x790 [ 1964.474157][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1964.480157][ C1] sysvec_apic_timer_interrupt+0x40/0xc0 [ 1964.485806][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1964.491807][ C1] RIP: 0010:mac80211_hwsim_tx_frame_no_nl.isra.0+0x77b/0x1330 [ 1964.499470][ C1] Code: 00 00 00 c6 84 24 98 00 00 00 00 74 bb e8 dd 48 3f fc 48 8d bb ac 3c 00 00 48 89 f8 48 89 fa 48 c1 e8 03 83 e2 07 0f b6 04 28 <38> d0 7f 08 84 c0 0f 85 36 09 00 00 44 0f b6 bb ac 3c 00 00 31 ff [ 1964.520045][ C1] RSP: 0018:ffffc90000dc0ba0 EFLAGS: 00000202 [ 1964.526130][ C1] RAX: 0000000000000000 RBX: ffff8880713c32a0 RCX: 0000000000000100 [ 1964.534115][ C1] RDX: 0000000000000004 RSI: ffffffff8536c303 RDI: ffff8880713c6f4c [ 1964.542094][ C1] RBP: dffffc0000000000 R08: 0000000000000002 R09: 0000000000000000 [ 1964.550074][ C1] R10: ffffffff8536c339 R11: 0000000000000000 R12: ffff888085849780 [ 1964.558055][ C1] R13: ffff8880317cb4d0 R14: ffff8880317cb2a0 R15: 0000000000000000 [ 1964.566052][ C1] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x799/0x1330 [ 1964.572938][ C1] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x763/0x1330 [ 1964.579833][ C1] ? mac80211_hwsim_add_chanctx+0x2a0/0x2a0 [ 1964.585742][ C1] ? ktime_get_with_offset+0x3f2/0x500 [ 1964.591231][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1964.597493][ C1] ? mac80211_hwsim_monitor_rx+0x1c2/0x840 [ 1964.603327][ C1] mac80211_hwsim_tx_frame+0x1ee/0x2a0 [ 1964.608812][ C1] mac80211_hwsim_beacon_tx+0x49b/0x930 [ 1964.614383][ C1] __iterate_interfaces+0x1e5/0x520 [ 1964.619660][ C1] ? mac80211_hwsim_tx_frame+0x2a0/0x2a0 [ 1964.625316][ C1] ? mac80211_hwsim_tx_frame+0x2a0/0x2a0 [ 1964.631025][ C1] ? mac80211_hwsim_addr_match+0x180/0x180 [ 1964.636939][ C1] ieee80211_iterate_active_interfaces_atomic+0x70/0x180 [ 1964.644017][ C1] mac80211_hwsim_beacon+0xd5/0x1a0 [ 1964.649265][ C1] __hrtimer_run_queues+0x609/0xe50 [ 1964.654496][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1964.660516][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1964.666643][ C1] hrtimer_run_softirq+0x17b/0x360 [ 1964.671776][ C1] __do_softirq+0x29b/0x9c2 [ 1964.676313][ C1] __irq_exit_rcu+0x123/0x180 [ 1964.681015][ C1] irq_exit_rcu+0x5/0x20 [ 1964.685283][ C1] sysvec_apic_timer_interrupt+0x93/0xc0 [ 1964.690934][ C1] [ 1964.693874][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1964.699933][ C1] RIP: 0010:lock_page_memcg+0x84/0x7d0 [ 1964.705497][ C1] Code: 48 c7 c7 60 fe 97 8b e8 6a 47 98 ff e8 35 a5 9e ff 5a 84 c0 0f 84 b2 03 00 00 0f 1f 44 00 00 49 8d 47 38 48 89 c2 48 89 45 d0 <48> b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 04 05 [ 1964.725119][ C1] RSP: 0018:ffffc9000e09f708 EFLAGS: 00000202 [ 1964.731201][ C1] RAX: ffffea0001f8c0b8 RBX: 0000000000000000 RCX: ffffffff8161c404 [ 1964.739183][ C1] RDX: ffffea0001f8c0b8 RSI: 0000000000000004 RDI: ffff8880b9d32a08 [ 1964.747165][ C1] RBP: ffffc9000e09f750 R08: 0000000000000000 R09: ffff8880b9d32a0b [ 1964.755143][ C1] R10: ffffed10173a6541 R11: 0000000000000000 R12: ffffea0001f8c088 [ 1964.763124][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffea0001f8c080 [ 1964.771117][ C1] ? rcu_is_watching+0x54/0xc0 [ 1964.775911][ C1] ? lock_page_memcg+0x33/0x7d0 [ 1964.780791][ C1] page_remove_rmap+0x25/0x1480 [ 1964.785668][ C1] ? mark_page_accessed+0x805/0x19d0 [ 1964.791039][ C1] unmap_page_range+0xed5/0x2a10 [ 1964.796024][ C1] ? vm_normal_page_pmd+0x550/0x550 [ 1964.801255][ C1] unmap_single_vma+0x198/0x310 [ 1964.806136][ C1] unmap_vmas+0x16d/0x2f0 [ 1964.810484][ C1] ? unmap_mapping_range+0x50/0x50 [ 1964.815608][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1964.821790][ C1] ? lru_add_drain+0x212/0x430 [ 1964.826635][ C1] exit_mmap+0x1d0/0x630 [ 1964.830911][ C1] ? irqentry_enter+0x28/0x50 [ 1964.835663][ C1] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1964.841672][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1964.847878][ C1] ? __mmput+0x113/0x4b0 [ 1964.852172][ C1] __mmput+0x122/0x4b0 [ 1964.856266][ C1] mmput+0x58/0x60 [ 1964.860007][ C1] do_exit+0xabc/0x2a30 [ 1964.864185][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1964.870364][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1964.875583][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 1964.880982][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 1964.886034][ C1] do_group_exit+0x125/0x310 [ 1964.890653][ C1] get_signal+0x47f/0x2160 [ 1964.895164][ C1] ? __fget_files+0x220/0x3e0 [ 1964.899903][ C1] arch_do_signal_or_restart+0x2a9/0x1c40 [ 1964.905690][ C1] ? __fget_light+0xea/0x280 [ 1964.910298][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1964.916558][ C1] ? get_sigframe_size+0x10/0x10 [ 1964.921514][ C1] ? fput+0x2a/0x50 [ 1964.925337][ C1] ? __sys_sendmsg+0x10c/0x1b0 [ 1964.930124][ C1] ? __sys_sendmsg_sock+0x30/0x30 [ 1964.935190][ C1] exit_to_user_mode_prepare+0x17d/0x290 [ 1964.940848][ C1] syscall_exit_to_user_mode+0x19/0x60 [ 1964.946333][ C1] do_syscall_64+0x42/0xb0 [ 1964.950889][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1964.956822][ C1] RIP: 0033:0x7fd557b3b709 [ 1964.961261][ C1] Code: Unable to access opcode bytes at RIP 0x7fd557b3b6df. [ 1964.968631][ C1] RSP: 002b:00007fd5550b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1964.977068][ C1] RAX: 0000000000033fe0 RBX: 00007fd557c3ff60 RCX: 00007fd557b3b709 [ 1964.985056][ C1] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000008 [ 1964.993039][ C1] RBP: 00007fd557b95cb4 R08: 0000000000000000 R09: 0000000000000000 [ 1965.001109][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1965.009089][ C1] R13: 00007fd558173b2f R14: 00007fd5550b2300 R15: 0000000000022000 [ 1965.017104][ C1] NMI backtrace for cpu 1 [ 1965.021445][ C1] CPU: 1 PID: 27934 Comm: syz-executor.2 Not tainted 5.15.0-rc2-syzkaller #0 [ 1965.030215][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1965.040277][ C1] Call Trace: [ 1965.043580][ C1] [ 1965.046440][ C1] dump_stack_lvl+0xcd/0x134 [ 1965.051053][ C1] nmi_cpu_backtrace.cold+0x47/0x144 [ 1965.056360][ C1] ? lapic_can_unplug_cpu+0x80/0x80 [ 1965.061676][ C1] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 1965.067676][ C1] rcu_dump_cpu_stacks+0x25e/0x3f0 [ 1965.072823][ C1] rcu_sched_clock_irq.cold+0x9d/0x746 [ 1965.078312][ C1] ? find_held_lock+0x2d/0x110 [ 1965.083098][ C1] ? rcutree_dead_cpu+0x30/0x30 [ 1965.087966][ C1] ? tick_sched_timer+0x2b/0x2d0 [ 1965.092916][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 1965.097803][ C1] update_process_times+0x16d/0x200 [ 1965.103027][ C1] tick_sched_handle+0x9b/0x180 [ 1965.107900][ C1] tick_sched_timer+0x1b0/0x2d0 [ 1965.112774][ C1] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 1965.118686][ C1] __hrtimer_run_queues+0x1c0/0xe50 [ 1965.123912][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1965.129907][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1965.136020][ C1] hrtimer_interrupt+0x31c/0x790 [ 1965.140986][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1965.146990][ C1] sysvec_apic_timer_interrupt+0x40/0xc0 [ 1965.152731][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1965.158734][ C1] RIP: 0010:mac80211_hwsim_tx_frame_no_nl.isra.0+0x77b/0x1330 [ 1965.166218][ C1] Code: 00 00 00 c6 84 24 98 00 00 00 00 74 bb e8 dd 48 3f fc 48 8d bb ac 3c 00 00 48 89 f8 48 89 fa 48 c1 e8 03 83 e2 07 0f b6 04 28 <38> d0 7f 08 84 c0 0f 85 36 09 00 00 44 0f b6 bb ac 3c 00 00 31 ff [ 1965.185842][ C1] RSP: 0018:ffffc90000dc0ba0 EFLAGS: 00000202 [ 1965.191924][ C1] RAX: 0000000000000000 RBX: ffff8880713c32a0 RCX: 0000000000000100 [ 1965.199903][ C1] RDX: 0000000000000004 RSI: ffffffff8536c303 RDI: ffff8880713c6f4c [ 1965.207882][ C1] RBP: dffffc0000000000 R08: 0000000000000002 R09: 0000000000000000 [ 1965.215871][ C1] R10: ffffffff8536c339 R11: 0000000000000000 R12: ffff888085849780 [ 1965.223940][ C1] R13: ffff8880317cb4d0 R14: ffff8880317cb2a0 R15: 0000000000000000 [ 1965.231922][ C1] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x799/0x1330 [ 1965.238802][ C1] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x763/0x1330 [ 1965.245691][ C1] ? mac80211_hwsim_add_chanctx+0x2a0/0x2a0 [ 1965.251611][ C1] ? ktime_get_with_offset+0x3f2/0x500 [ 1965.257091][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1965.263352][ C1] ? mac80211_hwsim_monitor_rx+0x1c2/0x840 [ 1965.269188][ C1] mac80211_hwsim_tx_frame+0x1ee/0x2a0 [ 1965.274674][ C1] mac80211_hwsim_beacon_tx+0x49b/0x930 [ 1965.280246][ C1] __iterate_interfaces+0x1e5/0x520 [ 1965.285461][ C1] ? mac80211_hwsim_tx_frame+0x2a0/0x2a0 [ 1965.291114][ C1] ? mac80211_hwsim_tx_frame+0x2a0/0x2a0 [ 1965.296763][ C1] ? mac80211_hwsim_addr_match+0x180/0x180 [ 1965.302591][ C1] ieee80211_iterate_active_interfaces_atomic+0x70/0x180 [ 1965.309639][ C1] mac80211_hwsim_beacon+0xd5/0x1a0 [ 1965.314866][ C1] __hrtimer_run_queues+0x609/0xe50 [ 1965.320095][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1965.326089][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1965.332185][ C1] hrtimer_run_softirq+0x17b/0x360 [ 1965.337322][ C1] __do_softirq+0x29b/0x9c2 [ 1965.341857][ C1] __irq_exit_rcu+0x123/0x180 [ 1965.346556][ C1] irq_exit_rcu+0x5/0x20 [ 1965.350816][ C1] sysvec_apic_timer_interrupt+0x93/0xc0 [ 1965.356469][ C1] [ 1965.359413][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1965.365417][ C1] RIP: 0010:lock_page_memcg+0x84/0x7d0 [ 1965.370901][ C1] Code: 48 c7 c7 60 fe 97 8b e8 6a 47 98 ff e8 35 a5 9e ff 5a 84 c0 0f 84 b2 03 00 00 0f 1f 44 00 00 49 8d 47 38 48 89 c2 48 89 45 d0 <48> b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 04 05 [ 1965.390539][ C1] RSP: 0018:ffffc9000e09f708 EFLAGS: 00000202 [ 1965.396618][ C1] RAX: ffffea0001f8c0b8 RBX: 0000000000000000 RCX: ffffffff8161c404 [ 1965.404602][ C1] RDX: ffffea0001f8c0b8 RSI: 0000000000000004 RDI: ffff8880b9d32a08 [ 1965.412585][ C1] RBP: ffffc9000e09f750 R08: 0000000000000000 R09: ffff8880b9d32a0b [ 1965.420652][ C1] R10: ffffed10173a6541 R11: 0000000000000000 R12: ffffea0001f8c088 [ 1965.428646][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffea0001f8c080 [ 1965.436643][ C1] ? rcu_is_watching+0x54/0xc0 [ 1965.441433][ C1] ? lock_page_memcg+0x33/0x7d0 [ 1965.446307][ C1] page_remove_rmap+0x25/0x1480 [ 1965.451174][ C1] ? mark_page_accessed+0x805/0x19d0 [ 1965.456488][ C1] unmap_page_range+0xed5/0x2a10 [ 1965.461475][ C1] ? vm_normal_page_pmd+0x550/0x550 [ 1965.466714][ C1] unmap_single_vma+0x198/0x310 [ 1965.471706][ C1] unmap_vmas+0x16d/0x2f0 [ 1965.476143][ C1] ? unmap_mapping_range+0x50/0x50 [ 1965.481272][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1965.487452][ C1] ? lru_add_drain+0x212/0x430 [ 1965.492256][ C1] exit_mmap+0x1d0/0x630 [ 1965.496516][ C1] ? irqentry_enter+0x28/0x50 [ 1965.501213][ C1] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1965.507207][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1965.513411][ C1] ? __mmput+0x113/0x4b0 [ 1965.517681][ C1] __mmput+0x122/0x4b0 [ 1965.521768][ C1] mmput+0x58/0x60 [ 1965.525512][ C1] do_exit+0xabc/0x2a30 [ 1965.529714][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1965.535972][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1965.541187][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 1965.546582][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 1965.551630][ C1] do_group_exit+0x125/0x310 [ 1965.556241][ C1] get_signal+0x47f/0x2160 [ 1965.560679][ C1] ? __fget_files+0x220/0x3e0 [ 1965.565401][ C1] arch_do_signal_or_restart+0x2a9/0x1c40 [ 1965.571146][ C1] ? __fget_light+0xea/0x280 [ 1965.575751][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1965.582704][ C1] ? get_sigframe_size+0x10/0x10 [ 1965.587658][ C1] ? fput+0x2a/0x50 [ 1965.591484][ C1] ? __sys_sendmsg+0x10c/0x1b0 [ 1965.596269][ C1] ? __sys_sendmsg_sock+0x30/0x30 [ 1965.601337][ C1] exit_to_user_mode_prepare+0x17d/0x290 [ 1965.606992][ C1] syscall_exit_to_user_mode+0x19/0x60 [ 1965.612469][ C1] do_syscall_64+0x42/0xb0 [ 1965.617426][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1965.623349][ C1] RIP: 0033:0x7fd557b3b709 [ 1965.627871][ C1] Code: Unable to access opcode bytes at RIP 0x7fd557b3b6df. [ 1965.635239][ C1] RSP: 002b:00007fd5550b2188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1965.643672][ C1] RAX: 0000000000033fe0 RBX: 00007fd557c3ff60 RCX: 00007fd557b3b709 [ 1965.651652][ C1] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000008 [ 1965.659648][ C1] RBP: 00007fd557b95cb4 R08: 0000000000000000 R09: 0000000000000000 [ 1965.667650][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1965.675730][ C1] R13: 00007fd558173b2f R14: 00007fd5550b2300 R15: 0000000000022000