0x84, 0x73, &(0x7f0000000280)={0x0, 0x2d7a, 0x30, 0xfffffffffffffffc, 0x7ff}, &(0x7f0000000380)=0x18) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r7, 0xc008551a, &(0x7f00000001c0)=ANY=[@ANYBLOB="070084881ec500e0c9bef7363cadc5f60084010002000000000200000000000000000000000000000000000000000000"]) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000440)={r8, 0x2c, &(0x7f00000003c0)=[@in6={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0xc97}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000000480)=0x10) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) ioctl$UI_BEGIN_FF_ERASE(r7, 0xc00c55ca, &(0x7f0000000600)={0x7, 0x100000000, 0xfffffffffffffffa}) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f00000000c0)=0x4, 0x4) ioctl$DRM_IOCTL_GET_MAP(r7, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x8, 0x0, 0x43, &(0x7f0000ffd000/0x3000)=nil, 0x6}) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r6, &(0x7f0000000300)={0x2c, 0x0, r5}, 0x10) [ 247.906053][ T9273] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6a, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x101) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000080)="f4", 0x1) 00:12:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300b00, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60ffff01ff3c060000000000000000000000ffffe00000000000000000000000000001880090784fcc3340b056d809040060b680faf00000000000000000fff5876d65b183cd620015350000ffffffffffff0000000000000014ffbb0022"], 0x0) 00:12:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-neonbs\x00'}, 0x58) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = open(&(0x7f0000000100)='./file0\x00', 0x480100, 0xa2ce35d9ed550b7d) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x7b52}, r3}}, 0x30) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x4000, 0x0) ioctl$EVIOCGREP(r4, 0x4020940d, &(0x7f0000d1df52)=""/174) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000200)=0x1, 0x4) r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000100a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:12:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4000, 0x0) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x1) mount(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) [ 248.179308][ T9295] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 00:12:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300b00, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60ffff01ff3c060000000000000000000000ffffe00000000000000000000000000001880090784fcc3340b056d809040060b680faf00000000000000000fff5876d65b183cd620015350000ffffffffffff0000000000000014ffbb0022"], 0x0) 00:12:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 248.323675][ T9305] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 248.367633][ T9295] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 00:12:43 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) capset(&(0x7f00000fc000)={0x20080522}, &(0x7f000047efe8)) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) 00:12:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300b00, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60ffff01ff3c060000000000000000000000ffffe00000000000000000000000000001880090784fcc3340b056d809040060b680faf00000000000000000fff5876d65b183cd620015350000ffffffffffff0000000000000014ffbb0022"], 0x0) 00:12:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:43 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000180)="0406530c4bd720720105") fsetxattr(r0, &(0x7f0000000000)=@random={'trusted.', '/dev/dri/card#\x00'}, &(0x7f0000000040)='/dev/dri/card#\x00', 0xf, 0x1) 00:12:43 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x200, 0x84000) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x400040, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f610500020081001f00003c04000800080008000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, 0x0) [ 248.527381][ T9315] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300b00, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60ffff01ff3c060000000000000000000000ffffe00000000000000000000000000001880090784fcc3340b056d809040060b680faf00000000000000000fff5876d65b183cd620015350000ffffffffffff0000000000000014ffbb0022"], 0x0) [ 248.610391][ T9319] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x101) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000080)="f4", 0x1) 00:12:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:43 executing program 0: recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000028c0)={&(0x7f0000001300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000002800)=[{&(0x7f0000001380)=""/131, 0x83}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/221, 0xdd}, {&(0x7f0000002540)=""/165, 0xa5}, {&(0x7f0000002600)=""/243, 0xf3}, {&(0x7f0000002700)}, {&(0x7f0000002740)=""/58, 0x3a}, {&(0x7f0000002780)=""/119, 0x77}], 0x8, &(0x7f0000002880)=""/27, 0x1b}, 0x102) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000002900)={r1}) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req={0xff, 0x0, 0x0, 0xfffffffffffffacf}, 0x45) sendmmsg(r2, &(0x7f0000008f00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000003c00)=@pppol2tpv3={0x1e, 0x3, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x2df, 0x0) 00:12:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8010) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x101000) iopl(0x8) [ 248.737227][ T9334] Option ' ' to dns_resolver key: bad/missing value 00:12:43 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x400, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000180)={0x0, 0x7ff, 0xfffffffffffffbff, [], &(0x7f0000000140)=0x4000}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30c) r1 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x100, 0x1003f) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000000)={0x31a62ee3, 0x0, [], {0x0, @reserved}}) 00:12:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8010) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x101000) iopl(0x8) [ 248.796835][ T9338] Option ' ' to dns_resolver key: bad/missing value [ 248.870464][ T9352] Option ' ' to dns_resolver key: bad/missing value 00:12:43 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unlink(0x0) r0 = getpid() sched_getattr(r0, &(0x7f0000000080), 0x30, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x311000, 0x0) accept$inet(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 00:12:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8010) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x101000) iopl(0x8) [ 248.994624][ T9362] IPVS: ftp: loaded support on port[0] = 21 00:12:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x4403f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xc0400, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000001c0)="b907080000b8031c68d2ba761d1d730f30c138000f01766c650f30dd7a1965f2a5643e36f0216f2cc4c1f8ae15eb13134cb9bb080000b80001c0feba000000000f3066ba2000ec", 0x47}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 249.072639][ T9366] Option ' ' to dns_resolver key: bad/missing value [ 249.087682][ T9344] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x9) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 249.149371][ T9335] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000340)={0x0, 0xffffffffffffff52, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r3, 0x931, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'broadcast-link\x00'}}}, 0x1b3}}, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000140)={{0x0, @broadcast, 0x0, 0x0, 'dh\x00'}, {@multicast2, 0x0, 0x0, 0x0, 0x5}}, 0x44) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 00:12:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8010) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x101000) iopl(0x8) 00:12:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 249.267215][ T9377] input:  as /devices/virtual/input/input7 [ 249.296358][ T9384] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 249.314669][ T9381] Option ' ' to dns_resolver key: bad/missing value 00:12:43 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x1) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000040)={0x3, 0x0, 0x5, [], &(0x7f0000000140)}) 00:12:43 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8010) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x101000) [ 249.344230][ T9389] IPVS: set_ctl: invalid protocol: 0 255.255.255.255:0 00:12:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {0xfffffffffffffffd}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) 00:12:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:44 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x1, 'qu2zZ\xdeqtC\x9e\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00`\xbe\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x8000, 0x0, 0x0, 0x0, @tick=0x800, {}, {}, @connect}], 0x30) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000005c0)=ANY=[@ANYBLOB="4e5964e96e523b6a070000000000df66630000000000000000005a", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000001700000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000004f0100000000000a300000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000060000000000000bf00000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000300000000000009000000000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000f0000000000000d700000000000000", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000001000100000000004800000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000008d01f4b7bfa3bea136b446f3e200000000009fc625"]) [ 249.506663][ T9377] input:  as /devices/virtual/input/input9 [ 249.535656][ T9401] Option ' ' to dns_resolver key: bad/missing value [ 249.547707][ T9406] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:44 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unlink(0x0) r0 = getpid() sched_getattr(r0, &(0x7f0000000080), 0x30, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x311000, 0x0) accept$inet(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 00:12:44 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x8440, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="69482b3489689dac497dccae859fc72f9ca94f421a04b9bda8258fd637109aadbc29"], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000280)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x42d, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000140)={0x5, r1, 0x10001}) 00:12:44 executing program 4: futex(0x0, 0xfbffffffffffffff, 0xfffffffffffffffd, 0x0, &(0x7f0000000080), 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) 00:12:44 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8010) syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x101000) 00:12:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x308, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:44 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) [ 250.010908][ T9421] Option ' ' to dns_resolver key: bad/missing value 00:12:44 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8010) 00:12:44 executing program 4: lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="757365722e2f2f2e656c696e757815b50101edd1ea06fc078604f9a991f7a573f076ee992fd03e56efdf50afaa8c"], 0x0, 0x1fb, 0x3) 00:12:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 250.073639][ T9432] IPVS: ftp: loaded support on port[0] = 21 00:12:44 executing program 1: r0 = socket$inet(0x2, 0x3, 0x800000000000b) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r2 = dup3(r1, r1, 0x80000) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x1, 0x138, [0x20000800, 0x0, 0x0, 0x20000830, 0x20000860], 0x90, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000110000000000000000000300736630000010000000000000000064756d6d793000000000000000000000696662300000000000000000000000006c6f0000000000000000007d0c0000000000ffffffffffff000000000000ffffffffffff00000000000000007000000070000000a8000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa000000ffffffff0000"]}, 0x1b0) 00:12:44 executing program 4: setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000b80)) geteuid() getresuid(0x0, &(0x7f0000000c00), &(0x7f0000000c40)) geteuid() fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000f40)={{}, {}, [{}, {}, {}], {}, [{}]}, 0x44, 0x2) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 00:12:44 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 250.224133][ T9446] Option ' ' to dns_resolver key: bad/missing value [ 250.361686][ T9457] Option ' ' to dns_resolver key: bad/missing value 00:12:45 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x30001, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)={@mcast2, 0x0}, &(0x7f0000000200)=0x14) sendmsg$can_raw(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)=@canfd={{0x1, 0x4, 0xedc1}, 0x30, 0x3, 0x0, 0x0, "83aa84b93a23e9db371860b7fca8fec47511328ce1fd0b394caf4e7c877bf2ea0874785b1502ebb5ab0c5e4082f6ce44c602e8b1b3c2338b36e66b3fcd7511d6"}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0xc, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x72, &(0x7f00000000c0)=@sack_info={r3}, 0xc) 00:12:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x38042, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x204000) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)={r5, 0x277}, &(0x7f0000000280)=0x8) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$KVM_SET_IRQCHIP(r1, 0xc008ae67, &(0x7f0000000080)={0x0, 0x0, @ioapic}) 00:12:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xffffffffffffffff) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) 00:12:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:45 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 00:12:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) [ 250.706797][ T9469] Option ' ' to dns_resolver key: bad/missing value 00:12:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000080)={"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"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@initdev}, &(0x7f00000004c0)=0x14) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0x6) write(r2, &(0x7f0000000500)="39ae9e4503741fec961afb05f894839355b37a3d2d40740ec0ee1917", 0x1c) 00:12:45 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3d, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "67c02219ea93a134ebbb1dc407df7d6a5c2eb2517a96eac49613e494092b90aa"}}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x1) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="0f01c936f30fae21f2afbaa100ec0f090f20e06635000001000f22e0643e6726f70dae950000000066b9c209000066b80000000066ba000000800f3066b9800000c00f326635000800000f303ef3ad", 0x4f}], 0x1, 0xf, &(0x7f0000000200)=[@dstype0={0x6, 0x4}, @efer={0x2, 0xc100}], 0x2) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 00:12:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 00:12:45 executing program 0: r0 = socket(0x11, 0x4, 0x0) write(r0, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c08000a0000000000", 0x24) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 00:12:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x803, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xfffffffffffffffd, 0x0) ioctl$KDGKBLED(r1, 0x8004510b, &(0x7f0000a07fff)) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f00000000c0)=0x2) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000000)) 00:12:45 executing program 0: socketpair$unix(0x1, 0x8000000005, 0x0, &(0x7f0000000100)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000180)=""/28, &(0x7f00000001c0)=0x1c) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x8001}, 0x28, 0x1) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)=0x2) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x2f72cbb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:12:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r2, 0x30, 0x1, @ib={0x1b, 0x2, 0x8, {"313dcf5c7ea99b3fb4148d85e8f6416e"}, 0x5, 0x9, 0x33}}}, 0xa0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='>group_iZ=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440), 0x10, 0x0, 0x0, &(0x7f0000000900)=ANY=[]}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000001540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001500)={&(0x7f0000000240)={0x2c, r4, 0x101, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0xd1d4, @bearer=@l2={'ib', 0x3a, 'ifb0\x00'}}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0x4000000) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000015c0)='ns/pid\x00') geteuid() mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x810, r5, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000001780)=""/4096) stat(0x0, 0x0) syz_open_dev$binder(0x0, 0x0, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r7 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x8001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f00000016c0)={0x0, @in6={{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x17}}}}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, 0x0, 0x0) execve(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xd) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) msgctl$IPC_STAT(0x0, 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x101000, 0x0) 00:12:45 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 00:12:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 00:12:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x210200, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x1, 0x3}, 0x10) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 00:12:45 executing program 1: r0 = socket$unix(0x1, 0x10000000007, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000040)=ANY=[]}) 00:12:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f4812fe01b2a4a280930a06000000a84306910000000b00140035000c00060000001900154002000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4faba7d4", 0x55}], 0x1}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x3, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 00:12:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 251.342526][ T9535] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. 00:12:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 251.420477][ T9535] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 251.428636][ T9535] IPv6: NLM_F_CREATE should be set when creating new route [ 251.436367][ T9535] IPv6: NLM_F_CREATE should be set when creating new route 00:12:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x204000) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f00000000c0)={0x14, 0x2, 0x101}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="80fd02090040", 0x6}], 0x1, 0x0) 00:12:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 251.591657][ T9548] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. [ 251.645724][ T9548] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 251.653254][ T9548] IPv6: NLM_F_CREATE should be set when creating new route [ 251.677289][ T9561] validate_nla: 12 callbacks suppressed [ 251.677300][ T9561] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:46 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 00:12:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f4812fe01b2a4a280930a06000000a84306910000000b00140035000c00060000001900154002000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4faba7d4", 0x55}], 0x1}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x3, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 00:12:46 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1, r2}) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r3 = socket(0xa, 0x1, 0x0) mmap(&(0x7f0000a07000/0x4000)=nil, 0x4000, 0x100000e, 0x113, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f0000000040)={0x6, 0x8, 0x3, {0x7, @sdr={0x32397f5b, 0x9}}}) getsockopt$inet6_int(r3, 0x6, 0xd, 0x0, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 251.821076][ T9567] netlink: 'syz-executor.0': attribute type 20 has an invalid length. [ 251.881175][ T9567] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 251.939309][ T9567] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. [ 251.996124][ T9567] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 252.004223][ T9567] IPv6: NLM_F_CREATE should be set when creating new route [ 252.088242][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 252.095170][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:12:47 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200101, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000180)=0x4) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x41, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$nbd(r4, &(0x7f0000000080)={0x6000000, 0x0, 0x0, 0x3, 0x2, "a3ef41749fa527ab78fc57f180bd82099cbab35a2fdbede5fbb11bedfb1f8cd557b0bdfcd7f42f63af872a0a11e32f7a0eb6bb02f6b78b1ea580f6ba185947306a84c6c5e7be78ab9406a3ea21ad8514d024cacb80e3ba56"}, 0x68) r5 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) 00:12:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:47 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x20, 0x0) ioctl$int_in(r0, 0x8000008010500c, &(0x7f0000000100)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000001c0)={0x0, 0x6, 0x1f, [], &(0x7f0000000140)=0xfffffffffffffff8}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x10001}, @window={0x3, 0x5, 0xbe3f}, @timestamp, @sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @mss={0x2, 0x200}], 0x9) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, 0x3, 0x6, 0x4, &(0x7f0000ffc000/0x4000)=nil, 0x2}) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000000c0)=[0x3ff, 0x4ebdc3d5]) 00:12:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) io_setup(0x10001, &(0x7f0000000080)=0x0) io_submit(r5, 0x3, &(0x7f0000000480)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x20, r1, &(0x7f00000001c0)="461bfc23a42786b8df7e82bebb09cb038abaf23efffe5a81017721b71341c2f81fd410e8576cc5d8ecd74b9750d9d7291694a57715758ec5f91688f722160c52d2550213031bf121d09bca94d9e06518f10fff8d7041f1ae2a8548b097c74460b869a8f67fbf012ed2a864f8eec390ba5f3134b8838b1455b083793b76620d2f4fab5a9244ee3ae6c530e73fb8e11a50ab96cb36575c56527d57de96baf8c2", 0x9f, 0x9, 0x0, 0x1, r2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x51, r1, &(0x7f00000002c0)="872f815ddba7eac2031d9a2fec112e885aff5d578e090d53cb8225562af84344c2333971a12514e16cc5cdb84170a0d27a3d394bc57deca7cc3b03d0c3c049907e96217371dd36e4000bb3e22aa5754f32e4aaa027c68a6cf1a63640e6f5af65497748c2c064d73a37059ec6cf840bf1c9224493db493e511e34dfa6005c407a902574954e4bf7fb594ee9e45799242fc4c74469286017ab26579df4c2aba9e770c2abd4bbeffa475b51522b14714dc500", 0xb1, 0x0, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f00000003c0)="e7b4289184ef93128b4e37dd6e1618f6c0f1536679f30c644f7fcc7fcde93f2a4fc43a76f2fddc563b1a519813498a6120f16cd8cb05be2f29f1d0c28292ee168ab45dac7b9bc04864505ca39449a18a7c5caa88456a65d1b13aae563340bed0e865730ddd54", 0x66, 0x811c, 0x0, 0x2, r3}]) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x5) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="706572652bcc3192794c69d93017fe9b0ac36834c36500d16c42249569cab1b971054a0a5854019be103000000000000000000952f692f539ea3075b16d6cd39b412aa00000066e5940ea482e12626df60a34269f2ce25f3c582c4801646cdb35870234ecccda611c2e1f7c3c4d57ef9cc984ac234cb52a61b714897b3554c8100000000000000000000000000000000"], 0x16) 00:12:47 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 252.474044][ T9593] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x7a, 0x40000009, 0x0, 0x3e67a337) pipe(&(0x7f0000000000)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000012c0)='/dev/admmidi#\x00', 0x5, 0x800) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001300)={0x0, 0x7fffffff}, &(0x7f0000001700)=0x8) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_DROP_MASTER(r4, 0x800876c9) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000001740)={r3, @in6={{0xa, 0x0, 0x5, @ipv4={[], [], @loopback}, 0x2}}, 0x100}, 0x88) rt_sigprocmask(0x4, &(0x7f00000004c0)={0x2}, &(0x7f0000000540), 0xfffffffffffffd7c) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x31040032}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)={0x3c, r5, 0x500, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0xc, 0x6, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}}}, [""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40840}, 0x40800) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x1) r6 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r6, 0x1ff) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x3f, &(0x7f00000001c0)=0x8, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/121, 0x79, 0x10002, &(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000240)={'veth1_to_team\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}}) sendto$inet(r2, &(0x7f0000000000)="ed5e683e4aff75573525928ec56ee3b5b639cb05d129112eac4216ea3ef2c86e003b8f1048ad68d3b3c6cc15ebb90ded100f2f4adfcd18bb2826e6ecbeb68e7ca2222e58ec1707640af76bdd6870c93188b083e037fe99a1117fcd49f1c0938f56defffac1a42583eabfae96cc32ef4da7c4b95283d08efd30952a16537473cef491214a45062c0cf58c0d42cd99c2145f9430460555acb21bedfdd668db21b8f6b4d26464912f2922099b2598b317982023a36925c3199dc493c66c6fa19f24871dabee920a44e90cf3260fd75b1ae066d230a4c5211017862a226f739d52af01e76fc5d807a13381d7ec2169dfcb5f", 0xf0, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000200)={0x7, [0x613f, 0x5, 0x80, 0x1f, 0xa17, 0x80, 0x5]}, 0x12) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x3, 0xa09, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f00000003c0), &(0x7f0000001800)=ANY=[@ANYBLOB="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"]}, 0xa81) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x2000, 0x800}, 0x18) [ 252.575804][ T9597] dlm: no locking on control device 00:12:47 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 252.679719][ T9597] dlm: no locking on control device [ 252.763149][ T9609] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 252.803275][ T9614] kvm: emulating exchange as write [ 252.813402][ T9622] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:47 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffffff, 0x10000000) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f00000000c0)={0x0, 0x4fe, 0x0, 0x4, 0x7}) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x6, 0x8000, 0x7, 0xfacb, 0x7}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) 00:12:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:47 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 253.009191][ T9635] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)='veth1\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e20, 0x2e, @mcast2, 0x50}}, 0x1, 0x6}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x1}, &(0x7f0000000280)=0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000ffffffff) ftruncate(r2, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)={'exec ', '/dev/dsp\x00'}, 0xe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x9, 0x4, 0x6, 0x4}) 00:12:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:47 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x11004401, 0x0) read(r0, &(0x7f0000000080)=""/62, 0x3e) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="020000000100000000000000040000ede29e0c13026e63d5b60000000000100056bf000000002000000000000000"], 0x24, 0x0) [ 253.144399][ T9609] syz-executor.0 (9609) used greatest stack depth: 22088 bytes left 00:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000012c0)='/dev/admmidi#\x00', 0x5, 0x800) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001300)={0x0, 0x7fffffff}, &(0x7f0000001700)=0x8) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_DROP_MASTER(r4, 0x800876c9) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000001740)={r3, @in6={{0xa, 0x0, 0x5, @ipv4={[], [], @loopback}, 0x2}}, 0x100}, 0x88) rt_sigprocmask(0x4, &(0x7f00000004c0)={0x2}, &(0x7f0000000540), 0xfffffffffffffd7c) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x31040032}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)={0x3c, r5, 0x500, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0xc, 0x6, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}}}, [""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40840}, 0x40800) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x1) r6 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r6, 0x1ff) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x3f, &(0x7f00000001c0)=0x8, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/121, 0x79, 0x10002, &(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000240)={'veth1_to_team\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}}) sendto$inet(r2, &(0x7f0000000000)="ed5e683e4aff75573525928ec56ee3b5b639cb05d129112eac4216ea3ef2c86e003b8f1048ad68d3b3c6cc15ebb90ded100f2f4adfcd18bb2826e6ecbeb68e7ca2222e58ec1707640af76bdd6870c93188b083e037fe99a1117fcd49f1c0938f56defffac1a42583eabfae96cc32ef4da7c4b95283d08efd30952a16537473cef491214a45062c0cf58c0d42cd99c2145f9430460555acb21bedfdd668db21b8f6b4d26464912f2922099b2598b317982023a36925c3199dc493c66c6fa19f24871dabee920a44e90cf3260fd75b1ae066d230a4c5211017862a226f739d52af01e76fc5d807a13381d7ec2169dfcb5f", 0xf0, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000200)={0x7, [0x613f, 0x5, 0x80, 0x1f, 0xa17, 0x80, 0x5]}, 0x12) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x3, 0xa09, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f00000003c0), &(0x7f0000001800)=ANY=[@ANYBLOB="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"]}, 0xa81) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x2000, 0x800}, 0x18) 00:12:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x280, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 253.226957][ T9649] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:47 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000030000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x80}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x408000, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000100)=0x1) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000200)={0x2, &(0x7f0000000140)=[0x6, 0x9]}) 00:12:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x3, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x7) r1 = getpgid(0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00\x00\xf5\xff\xff\xff\x00\x00\x00\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000241, 0x0) 00:12:48 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 253.493495][ T9669] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:48 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x1205) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000100)="f30f21d3c4c29507370f20c035100000000f22c00f20c035000000800f22c026660f01c866baf80cb870af638cef66bafc0c66b8009866efb9800000c00f3235008000000f300f06c4c29545909f1f00000f01cf", 0x54}], 0x1, 0x1, &(0x7f0000000180)=[@vmwrite={0x8, 0x0, 0x0, 0x0, 0x100, 0x0, 0x10000000000000, 0x0, 0x7ff}, @flags], 0x2) getsockopt$sock_int(r0, 0x1, 0x2b, 0x0, &(0x7f00000000c0)) msgget(0x0, 0x80) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000240)=0x54) 00:12:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x5865, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:48 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:48 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) [ 253.733092][ T9691] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000030000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x80}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x408000, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000100)=0x1) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000200)={0x2, &(0x7f0000000140)=[0x6, 0x9]}) 00:12:48 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000080)={0x1, {0x0, 0x1c9c380}, 0x5, 0x9aa8}) keyctl$join(0x1, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) bind$bt_rfcomm(r2, &(0x7f0000000100)={0x1f, {0x7, 0x1, 0x6, 0x1a, 0x80000001, 0x4}, 0x8}, 0xa) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r3 = creat(&(0x7f0000000040)='.\x00', 0x59) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x80000) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20001000) [ 253.786205][ T9693] dns_resolver_preparse: 13 callbacks suppressed [ 253.786214][ T9693] Option ' ' to dns_resolver key: bad/missing value 00:12:48 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 253.956150][ T9714] Option ' ' to dns_resolver key: bad/missing value 00:12:48 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/97, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000140)=""/181, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)=""/104, &(0x7f00000002c0)=""/4, &(0x7f0000000300)=""/255, 0x5000}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000200)={'bond0\x00', 0x2}) ioctl$VHOST_SET_FEATURES(r0, 0x4004af61, &(0x7f0000000080)=0x104000000) 00:12:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6558, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:48 executing program 1: socket$pppoe(0x18, 0x1, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x20, 0x1, 0x1ff, 0xfffffffffffffffe, 0x8, 0x84e00000000000}) syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x0) 00:12:48 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:48 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 254.151741][ T9730] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:48 executing program 5: add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 254.226845][ T9737] Option ' ' to dns_resolver key: bad/missing value 00:12:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000f060501fff8080000000000000000000c000140070000e37defff010c000b000000000000000200"], 0x2c}}, 0x0) inotify_init1(0x80000) 00:12:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:48 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 254.369024][ T9747] Option ' ' to dns_resolver key: bad/missing value 00:12:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8001, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x30, r4, 0x410, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) ioctl$KVM_SET_LAPIC(r2, 0x4008ae8a, &(0x7f0000000140)={"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"}) 00:12:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6a00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:49 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x80000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f00000000c0)=0x139) ftruncate(r0, 0x40) socket(0x8, 0x0, 0x0) 00:12:49 executing program 5: add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:49 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:49 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x101000, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x12200) ioctl$LOOP_CHANGE_FD(r0, 0x4c05, 0xffffffffffffffff) [ 255.029616][ T9767] Option ' ' to dns_resolver key: bad/missing value 00:12:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:49 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r1, &(0x7f0000000100)=""/248}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) unshare(0x20400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000300)={r3, 0x81}, 0x8) sync_file_range(r2, 0x0, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x10000, 0x1) 00:12:49 executing program 5: add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x200) socketpair(0x4, 0x80002, 0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r5, 0xb970, 0x3}, &(0x7f0000000200)=0xc) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000040)={0x0, r3}) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x181100, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r6, 0xc028ae92, &(0x7f00000002c0)={0x6, 0x10}) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000240)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1000000000001}) [ 255.227889][ T9789] Option ' ' to dns_resolver key: bad/missing value 00:12:49 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000280)=0x4a6) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:50 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) sched_getscheduler(r1) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000180)={0x0, 0x0, 0x8001}) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) 00:12:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000000c0)=0x5) r2 = dup(r1) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f00000001c0)={0x20, 0x48, &(0x7f0000000280)="ac795665280e7f79f358b1cbd0d373d5cdd94a10deebdd365aafa3126924287b1f7fc447cc96c820fde8da2282094a3a5954e7501611fb41f93af0632b2398f382e949dbd426e53f29d638", {0x5, 0xffffffff, 0x4745504d, 0xf, 0x401, 0x1, 0x0, 0x5}}) socket$bt_bnep(0x1f, 0x3, 0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x10000, 0x0) getdents64(r3, &(0x7f0000000300)=""/237, 0xed) ioctl$IMGETDEVINFO(r3, 0x80044944, &(0x7f0000000140)={0x4}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80080, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r4, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0x103, 0x4, {0x100000000, 0x7fff, 0x2, 0x7}}) r5 = socket$inet(0x2, 0x40004, 0x5) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x11, @multicast1, 0x0, 0x0, 'dh\x00\x00\xf0\xff|\x97\xacv\xb6\xee\xcb\xfa\x00', 0xfffffffffffffffe, 0x0, 0x100000000}, 0x2c) 00:12:50 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:50 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x10100, 0x0) 00:12:50 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') write$selinux_attr(r3, &(0x7f0000000500)='system_u:object_r:crypt_device_t:s0\x00', 0x24) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 255.544237][ T9821] Option ' ' to dns_resolver key: bad/missing value 00:12:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:50 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) exit(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x2}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYBLOB="05f38d153bdaf144000000b69fd41a267ccf415b939cc991cb633807cab25b02eae3d21c9844d8b007fbb54ef0b9e9bcfaf375d0426d1058b4dfb1e72bb4a554eb9b88cfa5b06ead59010bf49bf8e3703c029574ccda3c764ff01056f14356019f8c9c012008cbc98202131e6d5cee65df8c3f87b251b51252d0eb6a4d3009b2dd51dc361161e408fdaae4191c6f4a2a63e4ef691db3a2786fd81f2e2a7a0b3b2f987ce2a3cba7c59659d9568b903c7a1b220c98e8c8efded79653444f6e4a29ae7b44d619c97808"], 0x0) 00:12:50 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:50 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000200)=[{0x38, 0x0, 0x7, "44240f1100013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 00:12:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 255.832349][ T9838] Option ' ' to dns_resolver key: bad/missing value 00:12:50 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x2, 0x2000) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000280)={0x0, 0x9}) socketpair(0x5, 0xa, 0xb1, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7fffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x7d}, &(0x7f0000000140)=0x8) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x280000, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000200)) r4 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3, 0xffffffeffffffff5) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xa) r5 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f00000002c0)={0x2440, 0x5, 0x3f, 0x6450}) ioctl(r5, 0x80084121, 0x0) 00:12:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfeff, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:50 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:50 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 255.997079][ T9857] Option ' ' to dns_resolver key: bad/missing value 00:12:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xff0f, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:50 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x400005) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)={0x0, {0x2e, 0x1, 0x7806, 0x7680000000000000}}) 00:12:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x103, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) close(r0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x4000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000000c0)=""/3) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), 0x4) 00:12:51 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) exit(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x2}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYBLOB="05f38d153bdaf144000000b69fd41a267ccf415b939cc991cb633807cab25b02eae3d21c9844d8b007fbb54ef0b9e9bcfaf375d0426d1058b4dfb1e72bb4a554eb9b88cfa5b06ead59010bf49bf8e3703c029574ccda3c764ff01056f14356019f8c9c012008cbc98202131e6d5cee65df8c3f87b251b51252d0eb6a4d3009b2dd51dc361161e408fdaae4191c6f4a2a63e4ef691db3a2786fd81f2e2a7a0b3b2f987ce2a3cba7c59659d9568b903c7a1b220c98e8c8efded79653444f6e4a29ae7b44d619c97808"], 0x0) 00:12:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfffe, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:51 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:51 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:51 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 256.767911][ T9908] validate_nla: 14 callbacks suppressed [ 256.767922][ T9908] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:51 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x40000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 257.017140][ T9924] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x48}}, 0x0) 00:12:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000900)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100736974000c00020008000400", @ANYRES32=0x0], 0x38}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2401, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000180)={0x2, 0x5, 0x9}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x310, 0x70bd2a, 0x25dfdbfe, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x4, 0xfff, 0x5, 0x400]}]}, 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x20004000) 00:12:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:52 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:52 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{&(0x7f0000000440)=@xdp, 0x80, &(0x7f00000004c0), 0x68, &(0x7f0000000500)=""/209, 0xd1}, 0x2}], 0x1, 0x0, 0x0) [ 257.519383][ T9935] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:52 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getpeername$tipc(r1, &(0x7f0000000040)=@name, &(0x7f0000000140)=0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x67, 0xffd8) 00:12:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") madvise(&(0x7f0000bdc000/0x3000)=nil, 0x3000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x25, 0x0) r2 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x2a, 0x200) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000240)=0x10, 0x4) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000200)={0x1, r2}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000140)=0xe8) ioprio_set$uid(0x3, r3, 0x86) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000280)) 00:12:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180), 0x0, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 257.718794][ T9955] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup2(r0, r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r1}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2c500000b92c00000000000a6ac200000000000000000000010000b34b1b36c27977eeb30207f16a22a6fbda2676f9b61eeaf8456ba5d33186cb3f443ac5f69e78a8de9c3ee8670e2a2ba782edecebe06076b19d179f36755d2406abea3f5f60a3f8454bc863a38376d487fde7ad6fdd803515cbfbd76208dbe072259609cd94399227ef1ba2d4f3d3e78a2b1c7674bb43e81aca4b11c8d2ffefe7aa7fcbad66d6", @ANYRES32=0x0, @ANYBLOB="c16877b347b846226839a0ef49102124ec6fa903c6281c7c5812f6264c912a7102e8142c70014cabd97bc212bd4fdf04a48c5b60ccc51e0c2c65a73045506883c99f174fab9aca94dfd6f3945d9b2f902eb80fbc2c87d8037e744533042871b1915f9fbb4c99a86618c3e78905dbe2845285f88831555f5f738fc1a0b4c6480ae75fcd792fa0632b4d7200afbe2d6449ac85d69a6570b3e5989c6abbb22b5ae374c57e747d1685855cf4811d48d898d0e7a1aaf3fb86a341b670e9c936e3"], 0x2c}}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xb, &(0x7f0000000000)=0x491a, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) fgetxattr(r2, &(0x7f00000000c0)=@known='system.posix_acl_default\x00', &(0x7f0000000300)=""/180, 0xb4) write$FUSE_STATFS(r2, &(0x7f0000000500)={0x60, 0x0, 0x5, {{0x5e, 0x4, 0xe659, 0x7fff, 0xffffffff, 0x23, 0x8, 0x3ff}}}, 0x60) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@remote, 0x5f, r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r1, 0x28, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x10001}, 0xc) 00:12:52 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:52 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getpeername$tipc(r1, &(0x7f0000000040)=@name, &(0x7f0000000140)=0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x67, 0xffd8) 00:12:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180), 0x0, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:52 executing program 1: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x3, &(0x7f0000000040)={0x100}) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fffffff, 0x121002) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='task\x00') getdents(r2, &(0x7f0000000180)=""/229, 0xe5) socket$bt_bnep(0x1f, 0x3, 0x4) 00:12:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x4000, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x6}, 0x28, 0x1) io_setup(0x200000000003, &(0x7f0000000240)=0x0) io_submit(r1, 0x0, &(0x7f0000000040)) [ 257.967074][ T9981] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:52 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180), 0x0, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:52 executing program 1: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x3, &(0x7f0000000040)={0x100}) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fffffff, 0x121002) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='task\x00') getdents(r2, &(0x7f0000000180)=""/229, 0xe5) socket$bt_bnep(0x1f, 0x3, 0x4) [ 258.202457][T10000] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:52 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a", 0x2e, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:52 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80003, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcc, 0xe4, 0x0, {"30eacbc1b9b7ab2561981905d4c205ae7e87ee0364c718938551d7fda03d11a7b66934abb39306a7cbeb141e99dfc443a42b00d9f304a567e0d9c28b73696c847ea7e70ded850e71d1625393e8f8cdd2aebec67ae81eb5d70fa00451edb136015502e64e9c85199945e3c7b7cff122154a8d5f377c525c18b706c7ed04fea5280bc0030a1d92b75732e24f8c0f6a4dca1e3465992518a12f32e027ddefe83280adc0035babcb23ddc16a7fb291b6a14963f8efd3046a396eb6953cb4b9b8c4991b384bbf7608ffb417"}}, {0x0, "17dee3feabfbd175aed4d71f2777d643f029808c72c21c6e13a1c141557d6f1f1c6d1aa4c46fbb90505999fefd6732e1c7dec8985ef9b8f20299f527de2354f1eae0c09fb6e2e8b02bdcd0131c29289ef6"}}, &(0x7f0000000240)=""/4096, 0x137, 0x1000, 0x1}, 0x20) r2 = dup2(r0, r1) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40001000002, 0x1) syz_open_dev$dri(&(0x7f00000012c0)='/dev/dri/card#\x00', 0x3, 0x6001) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000040)={0x1c0323, 0x2}) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000001240)='trusted.overlay.origin\x00', &(0x7f0000001280)='y\x00', 0x2, 0x1) 00:12:52 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'nr0\x00', 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in=@local, 0x4e24, 0xc6, 0x4e24, 0x7, 0xa, 0x20, 0x7d, 0x0, r1, r2}, {0x6d, 0x7, 0x80000000, 0x5, 0x9, 0xfffffffffffffffe, 0x9, 0x8}, {0x6, 0x8, 0xfffffffffffffffe, 0x6}, 0x4, 0x6e6bba, 0x0, 0x1, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d4, 0x6f}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1b}, 0x34ff, 0x7, 0x2, 0xfff, 0x44d, 0x7bf, 0x5}}, 0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000100)=0xffffffffffffffff, 0x4) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000440)={0x0, 0x0, [], @bt={0x87f5, 0x8, 0xcb, 0x100, 0x8, 0x1ed7, 0x8, 0x2}}) sendmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="24000000240007011dfffd940101830020200a0009000000000000000000003f0d00ff7e", 0x24}], 0x1}, 0x0) 00:12:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a", 0x2e, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 258.413792][T10018] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000180)="479ad03a69e3642c51db3a716ff0ce9cfb3390f95a00e5ee8c3ea86007ac156d88ca39779ea732ab1a4f2a0dfb88387d10e95af5c071679d6bba4417bec3bf46792808d3c8091a2f8507ae68d7c0bf", 0x4f}, {&(0x7f0000000100)="4a92505bef", 0x5}, {&(0x7f0000000200)="90448aa8af9e82b5f3770b29adbf3a971eac81943d9fb0d190bdb132001d38bde485945bb6ba15a01c6db2c922bbdc357bfd1212a4d7316b44f6647c392f1a74eabfc1957e60cff430b8781e878e3ce62d533ce8e3aef26082c888675131d0aac30a46ad4e891f126ea6e7c0b4dce32ee80a6b3dc13bd6433e0eddac3476a4c8774cecb0780c3505275ed36e48d1d41ac228e251b8d16fe4a33f778667dc4b01c9487f6840a0875fbb3dcc143f11c146908838478fbafa2116934c27334331f56796d23cb6eda92798382aa0514d7255dec0b0b247df0168a12d0bfb43623c490739c9280f10808e5ea029c599d84efc1ae4d20b", 0xf4}, {&(0x7f0000000300)="91ecf05ccee4fdb4d78ca6f108161e57d1940b32052137d6d4545ebdb94813cad028f427ca571109e71cf446e605f184496dfb79645e5b00ac8363f912713b4071959e8afba1bb8bc3d626f00e984719e8db2dbf9b5f602b256c6b7f44765f607318d0391ce2a9f0a57fa8c79087ec6cb123cd1e26d460af7fa2854f63cbce2eda3ed25c09dde8d7f69baecdddb2a6be7b8e8a8a7ce6c28c9fc91df46fddbc52c91dae27dd99a067239f7aba3a", 0xad}, {&(0x7f00000003c0)="6ccfa6e8c4e9ec5584de7315587863d78b68366e19bcaa3ff06a268687a609e9ca061e42ab6ed5c4846656a3e0f96bb0eb0218747e7da9a82384e8bf3bffc34aa0f0de84c62258bbdbc5a9524e3316b9c834254d1015de80c208f172405aa4037dcb55d4c0fa35d8ef48fc96c0a51152e8caef0c18", 0x75}, {&(0x7f0000000440)="7f345b0bd326d0de0348c69c5975726033f4187c7f6415dbdf3e2e6ce001c91645c34227b958eb6448445da7a52b27c2392cade6b006f64d637a2c89ae684c55bb69f7132fe3f91454eb23f9e7dc1d400e52003d043038bdfd6ed5001e430c1e940436e1061ee06e4b47f19c7fc4b91d52f3adc172b5", 0x76}, {&(0x7f00000004c0)="71f306", 0x3}, {&(0x7f0000000500)='6', 0x1}, {&(0x7f0000000540)="b272d0acb0838196ccae6bd6869576db639de8537ef734580d3af5ba96188e242063e1987545324ff622f6a0d828fad56447c37c4d27d8e4cb7621129d3cd153061ced2e70d849d686bd4f51c46a4b6639780d6fa8eee06764eca36d598423451292efbb757405013a8d21d624114b403802fb54c61911187d07032b2b3f851b384dad4e39eb20f58f5d", 0x8a}], 0x9, &(0x7f0000000600)}}], 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x220000, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000080)="63857838dcaaccd80f223603097b304ca86a2e2e2396fd4f5f792fcfe508af5e46a1815371ee0d0ebdb4c341db7f3c54dd585ab02e09ff8b4c7c6a9f883c57ba2714599e7ba218840a06a847a6", 0x4d) 00:12:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:53 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @remote}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={r1, 0x97, "c83ccf7775ad22020c049469967c9435ed0f623c0101cad0bfacc6cc9fb6295d56339c0edf6d2b761b7f5f2df764e24130c827bfc93bdbc3bb446103f3633c05325f23ff73345d09fd3840d8327ea15e4edaab4fc1a8739b2f04def1054d15176b92baf5bdcaf2e9e0ec947ae358129359229921d70a88cd48110b7adc6c3754f42097741fa9cabe7a5d30fa1a21cd2ece3a873f53f266"}, &(0x7f0000000200)=0x9f) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x75, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x40959d11b4e2565c, 0x0) 00:12:53 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000080)={0xafc6, 0x0, 0x7}) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000180)=0xfffffffffffffff9) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x80010, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup2(r2, r1) 00:12:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a", 0x2e, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 258.632412][T10039] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e", 0x45, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x2, 0x0, @local, 0x1000000000000011}, 0x1c) sendmmsg(r0, &(0x7f0000001600), 0x66, 0x700000000000000) 00:12:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x67, 0x0, 0x8, 0xa1, 0x0, 0x6, 0x4, 0x3ca, 0x38, 0x22b, 0x8, 0x100, 0x20, 0x2, 0x0, 0x5, 0x7}, [{0x70000000, 0x1b4, 0x7ff, 0x100, 0x8, 0x9, 0xffffffffffffff28, 0x5}], "e08397183f692c11b6ec12c5114648518fe8569e7742eab642267f1f48c5a00faed0fe7606e1723cc5a718c43bc4e2fb23dfcd6f9e740981cc3540b4ff21f9130970b3c38c02c1fec6f3ba4ef6d20fd588385a31b68a1626b0606b07dd561fce1f8b079c85d0c3f30daa2b40e550cd69e5620550f8ecbe3cf015c0ac0287e640b2fbd0f361c956e2fde9a017af3fbe76826065d9312f73d8f47144940e0b540ba62f7bb19a8a2b", [[], [], [], [], []]}, 0x5ff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 00:12:53 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:53 executing program 0: r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x3, 0x40) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000002c0)={r4, 0x1}, 0x8) fcntl$getflags(r2, 0x52a6ce5c100fcc30) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x101, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @loopback}, {}, 0x2, 0x6, 0x9, 0x7, 0x0, 0x0, 0x7fff, 0x8, 0x5f6}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4800, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x1f, 0x4) ioctl$RTC_WIE_OFF(r5, 0x7010) [ 258.897106][T10059] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e", 0x45, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e", 0x45, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e23, 0x3, @local, 0x101}, {0xa, 0x4e23, 0xc2, @mcast2, 0x1}, 0xfffffffffffffffa, [0x7f, 0x9, 0x1f, 0x0, 0x800, 0x2, 0xc8f8, 0x8000]}, 0x5c) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)) 00:12:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b", 0x50, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:53 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 259.267298][T10085] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000040)='keyring\x00', 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x1d, r2, 0x0) 00:12:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x67, 0x0, 0x8, 0xa1, 0x0, 0x6, 0x4, 0x3ca, 0x38, 0x22b, 0x8, 0x100, 0x20, 0x2, 0x0, 0x5, 0x7}, [{0x70000000, 0x1b4, 0x7ff, 0x100, 0x8, 0x9, 0xffffffffffffff28, 0x5}], "e08397183f692c11b6ec12c5114648518fe8569e7742eab642267f1f48c5a00faed0fe7606e1723cc5a718c43bc4e2fb23dfcd6f9e740981cc3540b4ff21f9130970b3c38c02c1fec6f3ba4ef6d20fd588385a31b68a1626b0606b07dd561fce1f8b079c85d0c3f30daa2b40e550cd69e5620550f8ecbe3cf015c0ac0287e640b2fbd0f361c956e2fde9a017af3fbe76826065d9312f73d8f47144940e0b540ba62f7bb19a8a2b", [[], [], [], [], []]}, 0x5ff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r1, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 00:12:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b", 0x50, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x119000, 0x0) r4 = mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x2000002, 0x810, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x68, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, r4}, @reply_sg={0x40486312, {{0x2, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=[0x40]}, 0xd5b}}, @acquire={0x40046305, 0x4}], 0x0, 0x0, &(0x7f0000000240)}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x7ffffffff000}, 0x3bf, &(0x7f0000000140), 0x3bf, &(0x7f0000000080)=[@sndrcv={0x30}], 0x30}], 0x1, 0x0) 00:12:54 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b", 0x50, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x8000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000100a) writev(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x2f, @multicast2, 0x4e23, 0x2, 'nq\x00', 0x1, 0x9, 0x23}, 0x2c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000100)=r2) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="1f0000000203193b000007000000068100023b050900020000004000020058", 0x1f}], 0x1) 00:12:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000400)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00'}, 0x118) 00:12:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x8030000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:54 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b2300000000", 0x56, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:54 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, 0x0, &(0x7f0000000080)=0xfffffffffffffe59) r1 = dup3(r0, r0, 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) sendto$inet6(r1, &(0x7f0000000000)="7b053d3d6ceb8a5504a2c4537ee19ba539399ede87ec311072b4188e58d30acd9673d7c8b316ee81f7dcb16261b239adb26659c5c3e4d83ff88d8670b31f5db77563e505a19a9682db7894c92c4ed9f8f138f8389d8bf5c647ddaa74", 0x5c, 0x20000840, &(0x7f00000000c0)={0xa, 0x4e21, 0x7f0000000000000, @loopback, 0x8}, 0x1c) 00:12:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 259.923965][T10141] Option ' ' to dns_resolver key: bad/missing value 00:12:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80088808}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa8, r5, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x60}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6af}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x800}, 0x0) close(r4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) prctl$PR_CAPBSET_READ(0x17, 0x12) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000400)={0x0, 0x8d9c, 0x10001}, 0x14) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) write$P9_RREADDIR(r2, &(0x7f0000000340)={0x68, 0x29, 0x1, {0x4, [{{0x1, 0x4, 0x5}, 0x3ff, 0xfffffffffffffbff, 0x7, './file0'}, {{0x81, 0x3, 0x2}, 0x9, 0x3, 0x7, './file0'}, {{0x4, 0x1, 0x8}, 0x6, 0x401, 0x7, './file0'}]}}, 0x68) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 00:12:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x119000, 0x0) r4 = mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x2000002, 0x810, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x68, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, r4}, @reply_sg={0x40486312, {{0x2, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=[0x40]}, 0xd5b}}, @acquire={0x40046305, 0x4}], 0x0, 0x0, &(0x7f0000000240)}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x7ffffffff000}, 0x3bf, &(0x7f0000000140), 0x3bf, &(0x7f0000000080)=[@sndrcv={0x30}], 0x30}], 0x1, 0x0) 00:12:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xc000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:55 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0), 0x0) ioctl(r2, 0xffffffffffffffb2, &(0x7f0000000040)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000), 0x8) dup2(r3, r2) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) request_key(&(0x7f0000000000)='id_legacy\x00', 0x0, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x240, 0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x20002, 0x0) socketpair(0xf, 0x80006, 0x0, 0x0) syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x257, 0x4, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap$xdp(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x810, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$KVM_RUN(r5, 0xae80, 0x0) fcntl$getownex(r1, 0x10, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/snapshot\x00', 0x0, 0x0) 00:12:55 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b2300000000", 0x56, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 260.439820][T10166] Option ' ' to dns_resolver key: bad/missing value 00:12:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b2300000000", 0x56, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:55 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 260.657408][T10182] Option ' ' to dns_resolver key: bad/missing value 00:12:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b2300000000000000", 0x59, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 260.834458][T10198] Option ' ' to dns_resolver key: bad/missing value 00:12:55 executing program 4: recvmsg(0xffffffffffffffff, 0x0, 0x2100) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="df8686dd20"], 0x5) [ 261.031965][T10208] device nr0 entered promiscuous mode 00:12:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x119000, 0x0) r4 = mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x2000002, 0x810, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x68, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, r4}, @reply_sg={0x40486312, {{0x2, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=[0x40]}, 0xd5b}}, @acquire={0x40046305, 0x4}], 0x0, 0x0, &(0x7f0000000240)}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x7ffffffff000}, 0x3bf, &(0x7f0000000140), 0x3bf, &(0x7f0000000080)=[@sndrcv={0x30}], 0x30}], 0x1, 0x0) 00:12:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b2300000000000000", 0x59, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:55 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0), 0x0) ioctl(r2, 0xffffffffffffffb2, &(0x7f0000000040)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000), 0x8) dup2(r3, r2) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) request_key(&(0x7f0000000000)='id_legacy\x00', 0x0, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x240, 0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x20002, 0x0) socketpair(0xf, 0x80006, 0x0, 0x0) syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x257, 0x4, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap$xdp(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x810, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$KVM_RUN(r5, 0xae80, 0x0) fcntl$getownex(r1, 0x10, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/snapshot\x00', 0x0, 0x0) 00:12:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:55 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:55 executing program 4: recvmsg(0xffffffffffffffff, 0x0, 0x2100) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="df8686dd20"], 0x5) [ 261.303818][T10218] Option ' ' to dns_resolver key: bad/missing value 00:12:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:56 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 261.436213][T10232] device nr0 entered promiscuous mode 00:12:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b2300000000000000", 0x59, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:56 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 261.585820][T10241] Option ' ' to dns_resolver key: bad/missing value 00:12:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b230000000000000000", 0x5a, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 261.769917][T10249] Option ' ' to dns_resolver key: bad/missing value [ 261.898566][T10240] validate_nla: 11 callbacks suppressed [ 261.898575][T10240] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 261.914547][T10240] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x119000, 0x0) r4 = mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x2000002, 0x810, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x68, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, r4}, @reply_sg={0x40486312, {{0x2, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=[0x40]}, 0xd5b}}, @acquire={0x40046305, 0x4}], 0x0, 0x0, &(0x7f0000000240)}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x7ffffffff000}, 0x3bf, &(0x7f0000000140), 0x3bf, &(0x7f0000000080)=[@sndrcv={0x30}], 0x30}], 0x1, 0x0) 00:12:56 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:56 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x2100) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="df8686dd20"], 0x5) 00:12:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b230000000000000000", 0x5a, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x2a, 0x0, &(0x7f0000000080)) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x10000) 00:12:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 262.182640][T10258] Option ' ' to dns_resolver key: bad/missing value [ 262.191267][T10264] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b230000000000000000", 0x5a, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x4002, 0x0) mmap(&(0x7f00004b0000/0x2000)=nil, 0x2000, 0x4, 0xca010, r0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x100000000, 0x0, "eaa51938e2f1d45c4f5e98fc501bdca58b1afc39d4f8e08e63e0e5175d82e9ec50c045f94b555b682ce2fc406c407203d9a66ae8c5376e6df4e0c3ba1157147f6c16f402d178fb4b6c6d0b136f77be6f"}, 0xd8) ioctl$KVM_RUN(r0, 0xae80, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000480)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x7fff, 0x107, 0x2a, 0x6, {0x3, 0x9, 0x3ff, 0x6, 0x2, 0xc9b, 0x4, 0x8, 0x0, 0x88f4, 0x9, r1, r2, 0x54d4, 0x9}}, {0x0, 0x4}}}, 0xa0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x5, @mcast1}, {0xa, 0x4e20, 0x1f, @local}, 0x9, [0x5, 0xffff, 0x5, 0x5, 0x5, 0x2, 0xc59, 0x1f69]}, 0x5c) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) 00:12:56 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 262.335881][T10274] device nr0 entered promiscuous mode [ 262.362194][T10277] Option ' ' to dns_resolver key: bad/missing value [ 262.376794][T10281] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x65580000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 262.452792][T10288] Option ' ' to dns_resolver key: bad/missing value [ 262.785160][T10293] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x119000, 0x0) r4 = mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x2000002, 0x810, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x68, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, r4}, @reply_sg={0x40486312, {{0x2, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=[0x40]}, 0xd5b}}, @acquire={0x40046305, 0x4}], 0x0, 0x0, &(0x7f0000000240)}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:12:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:57 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x4002, 0x0) mmap(&(0x7f00004b0000/0x2000)=nil, 0x2000, 0x4, 0xca010, r0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x100000000, 0x0, "eaa51938e2f1d45c4f5e98fc501bdca58b1afc39d4f8e08e63e0e5175d82e9ec50c045f94b555b682ce2fc406c407203d9a66ae8c5376e6df4e0c3ba1157147f6c16f402d178fb4b6c6d0b136f77be6f"}, 0xd8) ioctl$KVM_RUN(r0, 0xae80, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000480)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x7fff, 0x107, 0x2a, 0x6, {0x3, 0x9, 0x3ff, 0x6, 0x2, 0xc9b, 0x4, 0x8, 0x0, 0x88f4, 0x9, r1, r2, 0x54d4, 0x9}}, {0x0, 0x4}}}, 0xa0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x5, @mcast1}, {0xa, 0x4e20, 0x1f, @local}, 0x9, [0x5, 0xffff, 0x5, 0x5, 0x5, 0x2, 0xc59, 0x1f69]}, 0x5c) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) 00:12:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) mknod$loop(&(0x7f0000000640)='./file0\x00', 0x0, 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000980)=ANY=[@ANYBLOB="040000000010a100000000003b2890897ce320bba13ea6a7976191781765fd8aa9a25f94c2500732471ab9e0f7b17a938fbaf60eb221e6860bec4da38ecd986acd057b429c2347527357c471c1ed"], 0xc) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/protocols\x00') sendmsg(r2, &(0x7f0000002fc8)={0x0, 0x165, 0x0, 0xf91cb9044f0f94eb, &(0x7f0000000140)=ANY=[], 0x1e2}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x7f, 0x7, 0x7}, 0x8) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x101, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24}, {0x2, 0x4e20, @rand_addr=0x9}, 0x4, 0x6, 0x9, 0x7, 0x0, &(0x7f0000000040)='ip_vti0\x00', 0x2, 0x7f, 0x5f6}) r4 = socket(0x10, 0x20000000802, 0x0) write(r4, &(0x7f0000000200)="240000001a0025f00018000400edfc0e8000000000000000000000000800020048050000", 0x24) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000380)={0x0, 0x26, 0x0, 0x2}, 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r4, 0x28, 0x6, &(0x7f00000005c0), 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@dev}}}, &(0x7f0000000b00)=0xe8) memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1) setxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@known='com.apple.FinderInfo\x00', &(0x7f0000000400)='/dev/loop#\x00', 0xffffffffffffff58, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="3700000015e2504068ed000000002cdd00f3ffffff0004000000a7e327a86df821af5074e73171fb0dd7d446b88a3f8843d5cfcdf7e9628c2326027b481965705b205535b1879a62cb4c90a900000000000000000000000000"]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000680)={{{@in=@local, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000880)={{{@in=@remote, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) getegid() 00:12:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 263.072029][T10312] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:57 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6a000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x2, 0x0, 0x1, 0x2}, 0x14) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000280)) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f00000003c0)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x2000000003ffffd, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f00000001c0)={0x0, 0xf, 0x0, "0a221e0f90e34f71d88d63c1b51843fca77c9d2131cc41eebd0b5001646404860ebcd90f4a88c6de9780b9b4e34a6688116946ea4fed730395312895", 0x400, "3d609853a7a4043e0dba732e86b142c93757fa5e3eb170d73c9bc978df6fb91bffb5524dfa2aa135d741b286ddd1d5e88492bb1954f7fe4c5b6f6730", 0x80}) write$binfmt_aout(r0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r0, r2}) getsockopt$inet6_mreq(r4, 0x29, 0x1f, &(0x7f0000000380)={@empty, 0x0}, &(0x7f0000000540)=0x14) bind$packet(r4, &(0x7f0000000580)={0x11, 0x1f, r5, 0x1, 0x7, 0x6, @random="f8496889f3c3"}, 0x14) recvmmsg(r3, 0x0, 0x0, 0x400002fd, 0x0) [ 263.294645][T10330] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 263.410603][T10338] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 263.489449][T10342] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 263.533992][T10342] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:12:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x119000, 0x0) mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x2000002, 0x810, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:12:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:58 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:58 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@ipx, &(0x7f0000000180)=0x80) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000400)={{0x1f, 0x1, 0x1, 0xea1, 0x7, 0x9}, 0x20, 0x7, 0x3, 0xe2, 0x8, "0937292f8dbf4dd5c84b6d9895bd26e045f3efeb8df44ddae218bbcf1af1e64709772b3c98a5fdca965d2bced9c8534545567b9daecd51388179d032938d60393878e5302d848945f23f96c690e56bf1d23d4040798d8c2d328d466140f1727ba808703e17e80d2d8c4948ed98442193a3431c0c74fa82747675d4eadc20dbe3"}) ioctl$BINDER_WRITE_READ(r0, 0x40046205, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000000500)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x48, 0x0, &(0x7f00000001c0)=[@enter_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000240)='-'}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x1a002, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000300)={r3, 0x7ff, 0x6, "7401e5b271bb26016e2bdec71ce983c192ea1b7813e7132a1252bd93e01d93fd7891a2468fb76380fb1f75d6375df69de451b5ef587bfd0612873cd64eada2499bb771ca2efe0f58d8205f2f004b70534890e4746a7a66c245292bdbf6de78152332690b8b43354641c26ac46d9f00795fb0bf9e2f4d465493821cec44b9f1b4b8bd85746b707eb400b91f218659b2b5f8ce4097ba18ae0e421f4863e190eaa565b42ba3fc4b6429017520fdfb89832980adac559b1e148d8a06502a0d"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000540)="bf"}) 00:12:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:58 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x6) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x2}, &(0x7f00000001c0)=0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000029fcc)={{0xffffffffffffffff}}) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2) [ 263.947559][T10352] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 263.961646][T10361] binder: 10356:10361 transaction failed 29189/-22, size 0-0 line 2994 00:12:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x0, 0x30, 0x7, 0x7}, &(0x7f0000000040)=0x18) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) setns(r2, 0x40000000) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r1, 0x7706, 0xfffffffffffffffb}, &(0x7f00000000c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f00000001c0)={0x7fff, 0x5}) write(r3, &(0x7f00000005c0)="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", 0xc88f7b3801bd8f3e) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000140)=0x2ef) 00:12:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 264.013443][T10361] binder: 10361 RLIMIT_NICE not set 00:12:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:58 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:58 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getsockname$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x1c) r1 = open(&(0x7f0000000280)='./file0\x00', 0x101000, 0x11) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000002c0)={0x5, 0x400, 0x7fff, 'queue1\x00', 0x3}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'team_slave_1\x00', 0x0}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x8000, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000140)={@dev={0xac, 0x14, 0x14, 0xb}, @multicast1, r3}, 0xc) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0xb}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv6_newaddr={0x2c, 0x66, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}]}, 0x2c}}, 0x0) [ 264.200149][T10384] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 264.241679][T10388] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 00:12:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x119000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:12:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:59 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:59 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000280), 0x10) io_setup(0x7, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000)="0300000093c21faf16da39de706f646800580f02000000003f420f000000000001580f02000000003f420f00000000000000000101000000", 0x38}]) 00:12:59 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) [ 264.760742][T10391] binder: 10356:10391 transaction failed 29189/-22, size 0-0 line 2994 00:12:59 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 00:12:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x88a8ffff, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:12:59 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:59 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:12:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 265.015964][T10417] dns_resolver_preparse: 7 callbacks suppressed [ 265.015974][T10417] Option ' ' to dns_resolver key: bad/missing value 00:12:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:00 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in=@empty, @in=@loopback}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, 0x0) r0 = msgget$private(0x0, 0x20) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) r2 = gettid() tgkill(r1, r2, 0x12) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/31) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209}) r7 = dup2(r4, r5) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000080)={0x9cf0000008, 0x800020009}) 00:13:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:00 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfeff0000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) write(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) recvmsg(r2, 0x0, 0x99147de9abf155d) socket$nl_netfilter(0x10, 0x3, 0xc) bind(0xffffffffffffffff, 0x0, 0x6b87fcf18c65e030) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR, @ANYPTR64], @ANYRESHEX=0x0, @ANYRES16=r3, @ANYRES32=r2, @ANYRESOCT=r0], @ANYRES16=r1]) write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) [ 266.061502][T10487] Option ' ' to dns_resolver key: bad/missing value 00:13:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:01 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:01 executing program 4: pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) nanosleep(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 00:13:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x84, @empty, 0x0, 0x2, 'sh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x2c) 00:13:01 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$FICLONERANGE(r1, 0x4020940d, 0x0) dup3(r0, r1, 0x0) 00:13:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1}]}, 0x0, 0x5, 0xc3, &(0x7f0000000040)=""/195}, 0x48) 00:13:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:01 executing program 1: pipe(&(0x7f0000000180)) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xffffff35) 00:13:01 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:01 executing program 5: socket$inet_sctp(0x2, 0x1, 0x84) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, 0x0, 0x0, 0x0) 00:13:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:01 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xbb) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x10, 0x3bb) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 00:13:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:02 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:02 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001500)='/dev/autofs\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000180), 0xfe0c) ioctl$TIOCSETD(r2, 0x5423, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 00:13:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x40030000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 267.451460][T10553] validate_nla: 14 callbacks suppressed [ 267.451469][T10553] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:02 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:02 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:02 executing program 1: [ 267.585448][T10568] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:02 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:02 executing program 1: 00:13:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:02 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:02 executing program 1: 00:13:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf0ffffffffffff, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:02 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xd) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 00:13:02 executing program 1: open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) shmget(0x2, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180), 0x1, 0x0, 0x0, 0x20004080}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r2) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) r3 = syz_open_pts(r2, 0x5) r4 = dup3(r3, r2, 0x0) write$UHID_INPUT(r4, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) [ 268.227826][T10593] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000440)=""/111, 0x6f}], 0x1, 0x0) 00:13:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 268.275013][T10595] ptrace attach of "/root/syz-executor.4"[10592] was attempted by "/root/syz-executor.4"[10595] 00:13:02 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:03 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:03 executing program 4: [ 268.402135][T10612] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:03 executing program 1: 00:13:03 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) 00:13:03 executing program 4: 00:13:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:03 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:03 executing program 4: 00:13:03 executing program 1: [ 269.112449][T10634] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:03 executing program 4: 00:13:03 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) 00:13:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x300000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:03 executing program 1: [ 269.326790][T10651] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:04 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:04 executing program 4: 00:13:04 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) 00:13:04 executing program 1: 00:13:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:04 executing program 4: [ 269.971093][T10664] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:04 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) 00:13:04 executing program 1: 00:13:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x500000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:04 executing program 4: 00:13:04 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 270.194784][T10680] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:05 executing program 1: 00:13:05 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) 00:13:05 executing program 4: 00:13:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:05 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:05 executing program 1: [ 270.853964][T10697] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:05 executing program 4: 00:13:05 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) 00:13:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x700000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:05 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:05 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:05 executing program 1: 00:13:05 executing program 4: 00:13:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 271.144742][T10719] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:05 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000002400)='I', 0x1}], 0x1, 0x40000) fallocate(r1, 0x3, 0x0, 0x4) socketpair$unix(0x1, 0x8000000002, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r1, 0x0, 0x0, 0xcf) lseek(r1, 0x0, 0x3) 00:13:05 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r0) 00:13:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x800000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:05 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:05 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r0}, &(0x7f0000000140)=0x8) 00:13:06 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x803000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:06 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x220800, 0x0) ppoll(&(0x7f0000000200)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) 00:13:06 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r1 = epoll_create(0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, 0x0, 0x99147de9abf155d) socket$nl_netfilter(0x10, 0x3, 0xc) bind(0xffffffffffffffff, 0x0, 0x6b87fcf18c65e030) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000340)={0x38}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64], @ANYRESHEX=0x0, @ANYRES16=r3, @ANYRES32=r2, @ANYRESOCT=r0], @ANYRES16=r1]) write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) 00:13:06 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r0}, &(0x7f0000000140)=0x8) 00:13:06 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:06 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x5}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x5e, 0x0) 00:13:06 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r0}, &(0x7f0000000140)=0x8) 00:13:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xc00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:06 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:06 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:06 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xe00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:06 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:06 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:06 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1000000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:06 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:06 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2000000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 272.677358][T10851] validate_nla: 8 callbacks suppressed [ 272.677371][T10851] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:07 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:07 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:07 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4000000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 273.040408][T10823] dccp_close: ABORT with 1 bytes unread 00:13:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:07 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 273.099625][T10860] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4800000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:07 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:07 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4c00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:08 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:08 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:08 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 274.037233][T10908] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6000000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:08 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:08 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:08 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 274.203940][T10919] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 00:13:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6558000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:09 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:09 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:09 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 274.890075][T10946] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:09 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6800000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:09 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:09 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 275.137714][T10969] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6a00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 275.283011][T10974] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 00:13:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:10 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:10 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:10 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6c00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x8, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 275.745276][T10983] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:10 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:10 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7400000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:10 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 275.960480][T11010] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7a00000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 276.120221][T11017] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 00:13:11 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:11 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x8100000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:11 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x88a8ffff00000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:11 executing program 5: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:11 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:11 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x9effffff00000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:11 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 00:13:12 executing program 5: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:12 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfeff000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:12 executing program 5: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xff0f000000000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 277.731252][T11085] validate_nla: 7 callbacks suppressed [ 277.731264][T11085] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xffffff7f00000000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 277.893663][T11096] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:12 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfffffffffffff000, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:12 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 278.346664][T11108] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:13 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:13 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 278.485972][T11124] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:13 executing program 3: r0 = syz_open_dev$audion(0x0, 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 278.592603][T11124] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:13 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:13 executing program 3: r0 = syz_open_dev$audion(0x0, 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:13 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 279.185178][T11147] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:13 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:13 executing program 3: r0 = syz_open_dev$audion(0x0, 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 279.305788][T11160] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:14 executing program 4 (fault-call:1 fault-nth:0): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:14 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 279.448866][T11169] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 279.465245][T11171] FAULT_INJECTION: forcing a failure. [ 279.465245][T11171] name failslab, interval 1, probability 0, space 0, times 0 [ 279.489094][T11169] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 279.489760][T11171] CPU: 0 PID: 11171 Comm: syz-executor.4 Not tainted 5.0.0+ #20 [ 279.504947][T11171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.515032][T11171] Call Trace: [ 279.518345][T11171] dump_stack+0x172/0x1f0 [ 279.522716][T11171] should_fail.cold+0xa/0x15 [ 279.527323][T11171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 279.533302][T11171] ? ___might_sleep+0x163/0x280 [ 279.538259][T11171] __should_failslab+0x121/0x190 [ 279.543226][T11171] should_failslab+0x9/0x14 [ 279.547771][T11171] kmem_cache_alloc_node_trace+0x270/0x720 [ 279.553585][T11171] ? __check_object_size+0x3d/0x42f [ 279.558908][T11171] ? wait_for_completion+0x440/0x440 [ 279.564216][T11171] __kmalloc_node+0x3d/0x70 [ 279.568774][T11171] kvmalloc_node+0x68/0x100 [ 279.573295][T11171] __x64_sys_add_key+0x3cd/0x4f0 [ 279.578309][T11171] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 279.585001][T11171] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 279.590469][T11171] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.596593][T11171] ? lockdep_hardirqs_on+0x418/0x5d0 [ 279.601899][T11171] ? trace_hardirqs_on+0x67/0x230 [ 279.606941][T11171] do_syscall_64+0x103/0x610 [ 279.611558][T11171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.617556][T11171] RIP: 0033:0x457f29 [ 279.621492][T11171] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.641906][T11171] RSP: 002b:00007f7acb3a2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 279.650327][T11171] RAX: ffffffffffffffda RBX: 00007f7acb3a2c90 RCX: 0000000000457f29 [ 279.658300][T11171] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000020000040 [ 279.666458][T11171] RBP: 000000000073bf00 R08: fffffffffffffffb R09: 0000000000000000 [ 279.682395][T11171] R10: 000000000000005b R11: 0000000000000246 R12: 00007f7acb3a36d4 [ 279.690370][T11171] R13: 00000000004bde4a R14: 00000000004ce2a8 R15: 0000000000000003 00:13:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:14 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:14 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:14 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 280.090639][T11185] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 280.102913][T11187] Option ' ' to dns_resolver key: bad/missing value 00:13:14 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:14 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='\nns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:15 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:15 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='%ns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:15 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:15 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='.ns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:15 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:15 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='d\ns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:15 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:15 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:15 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='d%s_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:16 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:16 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dn\n_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dn%_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:16 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dn._resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:16 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:16 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:16 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:17 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dnX_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:17 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:17 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:17 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:17 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 282.842800][T11357] validate_nla: 11 callbacks suppressed [ 282.842811][T11357] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:17 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dnc_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:17 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 283.180276][T11373] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:18 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, 0x0, 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dnd_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:18 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, 0x0, 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 283.564190][T11395] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:18 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, 0x0, 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dni_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 283.745774][T11406] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 283.787403][T11406] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:18 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, 0x0, 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dnl_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 284.095532][T11423] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 284.112262][T11423] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:18 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, 0x0, 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:18 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, 0x0, 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dno_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dnp_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 284.422684][T11442] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:19 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 284.607704][T11460] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:19 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dnu_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 284.993606][T11467] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:19 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dnx_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:19 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns\nresolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:20 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:20 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns%resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:20 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_\nesolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:20 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:20 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_%esolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:20 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:21 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_r\nsolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:21 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:21 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) 00:13:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:21 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) 00:13:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_r%solver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:21 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, 0x0, 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:22 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) 00:13:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_re\nolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:22 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, 0x0, 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:22 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) [ 287.911456][T11628] validate_nla: 10 callbacks suppressed [ 287.911467][T11628] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_re%olver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:22 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) 00:13:22 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, 0x0, 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 288.054495][T11637] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 288.202259][T11652] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:22 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) 00:13:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_re.olver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:23 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) [ 288.800030][T11663] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_reXolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:23 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_recolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 288.988596][T11683] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 289.061462][T11683] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:23 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 289.314742][T11701] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:24 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_redolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:24 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 289.650073][T11712] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 289.671214][T11667] dccp_close: ABORT with 1061 bytes unread [ 289.710556][T11668] dccp_close: ABORT with 1 bytes unread 00:13:24 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:24 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:24 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_reiolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 289.830579][T11725] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:24 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_relolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 289.992720][T11740] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:24 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:25 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_reoolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:25 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_repolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:25 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_reuolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:25 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_rexolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_res\nlver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:26 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:26 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000140)) 00:13:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_res%lver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:26 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resclver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) [ 292.177987][T11803] dccp_close: ABORT with 1061 bytes unread [ 292.178036][T11804] dccp_close: ABORT with 1 bytes unread 00:13:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_reso\nver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:27 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_reso%ver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000140)) 00:13:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_reso.ver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:27 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:27 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 293.069063][T11850] dccp_close: ABORT with 1061 bytes unread [ 293.166496][T11907] validate_nla: 11 callbacks suppressed [ 293.166518][T11907] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:27 executing program 5 (fault-call:8 fault-nth:0): dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resoLver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:27 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 293.411802][T11922] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 293.453118][T11924] FAULT_INJECTION: forcing a failure. [ 293.453118][T11924] name failslab, interval 1, probability 0, space 0, times 0 [ 293.473205][T11924] CPU: 1 PID: 11924 Comm: syz-executor.5 Not tainted 5.0.0+ #20 [ 293.480944][T11924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.491011][T11924] Call Trace: [ 293.494321][T11924] dump_stack+0x172/0x1f0 [ 293.498688][T11924] should_fail.cold+0xa/0x15 [ 293.503292][T11924] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 293.509110][T11924] ? ___might_sleep+0x163/0x280 [ 293.513969][T11924] __should_failslab+0x121/0x190 [ 293.518912][T11924] ? loop_info64_to_compat+0x6d0/0x6d0 [ 293.524386][T11924] should_failslab+0x9/0x14 [ 293.528904][T11924] kmem_cache_alloc_trace+0x2d1/0x760 [ 293.534299][T11924] ? loop_info64_to_compat+0x6d0/0x6d0 [ 293.539879][T11924] __kthread_create_on_node+0xf2/0x460 [ 293.545340][T11924] ? lock_acquire+0x16f/0x3f0 [ 293.550018][T11924] ? kthread_parkme+0xb0/0xb0 [ 293.554747][T11924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.561052][T11924] ? kasan_check_read+0x11/0x20 [ 293.565937][T11924] ? mutex_trylock+0x1e0/0x1e0 [ 293.570686][T11924] ? loop_info64_to_compat+0x6d0/0x6d0 [ 293.576138][T11924] kthread_create_on_node+0xbb/0xf0 [ 293.581333][T11924] ? __kthread_create_on_node+0x460/0x460 [ 293.587041][T11924] ? lockdep_init_map+0x1be/0x6d0 [ 293.592068][T11924] ? lockdep_init_map+0x1be/0x6d0 [ 293.597080][T11924] lo_ioctl+0xc1b/0x2150 [ 293.601325][T11924] ? lo_rw_aio+0x1120/0x1120 [ 293.605900][T11924] blkdev_ioctl+0xee8/0x1c40 [ 293.610472][T11924] ? blkpg_ioctl+0xa90/0xa90 [ 293.615067][T11924] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 293.620864][T11924] ? __fget+0x35a/0x550 [ 293.625005][T11924] block_ioctl+0xee/0x130 [ 293.629337][T11924] ? blkdev_fallocate+0x410/0x410 [ 293.634343][T11924] do_vfs_ioctl+0xd6e/0x1390 [ 293.639033][T11924] ? ioctl_preallocate+0x210/0x210 [ 293.644130][T11924] ? __fget+0x381/0x550 [ 293.648299][T11924] ? ksys_dup3+0x3e0/0x3e0 [ 293.652735][T11924] ? tomoyo_file_ioctl+0x23/0x30 [ 293.657655][T11924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.663893][T11924] ? security_file_ioctl+0x93/0xc0 [ 293.668989][T11924] ksys_ioctl+0xab/0xd0 [ 293.673142][T11924] __x64_sys_ioctl+0x73/0xb0 [ 293.677766][T11924] ? do_syscall_64+0x5b/0x610 [ 293.682433][T11924] do_syscall_64+0x103/0x610 [ 293.687013][T11924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.692912][T11924] RIP: 0033:0x457f29 [ 293.696804][T11924] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.716532][T11924] RSP: 002b:00007f374026bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.725127][T11924] RAX: ffffffffffffffda RBX: 00007f374026bc90 RCX: 0000000000457f29 [ 293.734353][T11924] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 293.742319][T11924] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 00:13:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000140)) 00:13:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:28 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resouver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 293.750300][T11924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f374026c6d4 [ 293.758266][T11924] R13: 00000000004c11b2 R14: 00000000004d30c0 R15: 0000000000000006 00:13:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:28 executing program 5 (fault-call:8 fault-nth:1): dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resol\ner\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 293.940265][T11946] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 293.966657][T11946] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:28 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 294.061050][T11952] FAULT_INJECTION: forcing a failure. [ 294.061050][T11952] name failslab, interval 1, probability 0, space 0, times 0 [ 294.084621][T11952] CPU: 1 PID: 11952 Comm: syz-executor.5 Not tainted 5.0.0+ #20 [ 294.092274][T11952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.102336][T11952] Call Trace: [ 294.105644][T11952] dump_stack+0x172/0x1f0 [ 294.110038][T11952] should_fail.cold+0xa/0x15 [ 294.114646][T11952] ? lock_downgrade+0x880/0x880 [ 294.119522][T11952] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 294.125347][T11952] ? mark_held_locks+0xa4/0xf0 [ 294.130120][T11952] __should_failslab+0x121/0x190 [ 294.135067][T11952] should_failslab+0x9/0x14 [ 294.139563][T11952] kmem_cache_alloc+0x47/0x6f0 [ 294.144312][T11952] ? ___might_sleep+0x163/0x280 [ 294.149147][T11952] ? mempool_alloc+0x380/0x380 [ 294.153904][T11952] mempool_alloc_slab+0x47/0x60 [ 294.158753][T11952] mempool_alloc+0x16b/0x380 [ 294.163330][T11952] ? mempool_destroy+0x40/0x40 [ 294.168083][T11952] ? _raw_spin_unlock_irq+0x54/0x90 [ 294.173275][T11952] ? _raw_spin_unlock_irq+0x5e/0x90 [ 294.178455][T11952] ? __schedule+0x1387/0x1cc0 [ 294.183120][T11952] bio_alloc_bioset+0x3bf/0x680 [ 294.187958][T11952] ? set_user_nice.part.0+0x292/0x5e0 [ 294.193312][T11952] ? bvec_alloc+0x2f0/0x2f0 [ 294.197806][T11952] ? errseq_check+0x53/0x90 [ 294.202305][T11952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.208539][T11952] ? file_check_and_advance_wb_err+0x9e/0x3a0 [ 294.214596][T11952] blkdev_issue_flush+0xcd/0x300 [ 294.219545][T11952] blkdev_fsync+0x95/0xd0 [ 294.223876][T11952] ? thaw_bdev+0x1a0/0x1a0 [ 294.228281][T11952] vfs_fsync_range+0x144/0x230 [ 294.233039][T11952] vfs_fsync+0x2a/0x30 [ 294.237094][T11952] __loop_update_dio+0x4e1/0x6b0 [ 294.242021][T11952] lo_ioctl+0x1022/0x2150 [ 294.246355][T11952] ? lo_rw_aio+0x1120/0x1120 [ 294.250931][T11952] blkdev_ioctl+0xee8/0x1c40 [ 294.255535][T11952] ? blkpg_ioctl+0xa90/0xa90 [ 294.260114][T11952] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 294.265683][T11952] ? retint_kernel+0x2d/0x2d [ 294.270264][T11952] block_ioctl+0xee/0x130 [ 294.274576][T11952] ? blkdev_fallocate+0x410/0x410 [ 294.279598][T11952] do_vfs_ioctl+0xd6e/0x1390 [ 294.284184][T11952] ? ioctl_preallocate+0x210/0x210 [ 294.289289][T11952] ? __fget+0x381/0x550 [ 294.293433][T11952] ? ksys_dup3+0x3e0/0x3e0 [ 294.297863][T11952] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 294.304087][T11952] ? fput_many+0x12c/0x1a0 [ 294.308490][T11952] ? tomoyo_file_ioctl+0x23/0x30 [ 294.313576][T11952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.319802][T11952] ? security_file_ioctl+0x93/0xc0 [ 294.324914][T11952] ksys_ioctl+0xab/0xd0 [ 294.329073][T11952] __x64_sys_ioctl+0x73/0xb0 [ 294.333669][T11952] do_syscall_64+0x103/0x610 [ 294.338247][T11952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.344121][T11952] RIP: 0033:0x457f29 [ 294.347997][T11952] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.367584][T11952] RSP: 002b:00007f374026bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.375989][T11952] RAX: ffffffffffffffda RBX: 00007f374026bc90 RCX: 0000000000457f29 [ 294.383968][T11952] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.391929][T11952] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 294.399911][T11952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f374026c6d4 00:13:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resol%er\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 294.407875][T11952] R13: 00000000004c11b2 R14: 00000000004d30c0 R15: 0000000000000006 [ 294.495935][T11965] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:29 executing program 5 (fault-call:8 fault-nth:2): dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 00:13:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolv\nr\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:29 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:29 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) [ 294.750202][T11990] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolv%r\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:29 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x2, r0) 00:13:29 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(0x0, 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolve\n\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 294.922605][T12011] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 295.093348][T12026] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:30 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x301, r0) 00:13:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolve%\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:30 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(0x0, 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 295.624219][T12037] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x02', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 295.696613][T12037] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:30 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x125d, r0) 00:13:30 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(0x0, 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x03', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:30 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x125e, r0) 00:13:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:13:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:31 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x125f, r0) 00:13:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x04', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:31 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x0, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x05', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:31 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1260, r0) 00:13:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x06', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:31 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x0, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, 0x0) 00:13:31 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1261, r0) 00:13:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\a', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:31 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x0, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:32 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1262, r0) 00:13:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\b', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:32 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\n', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, 0x0) 00:13:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:32 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1263, r0) 00:13:32 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolverH', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolverL', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 298.214193][T12182] validate_nla: 8 callbacks suppressed [ 298.214203][T12182] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 298.283998][T12182] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:33 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:33 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1264, r0) 00:13:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver`', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 298.457395][T12210] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 298.602750][T12224] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, 0x0) 00:13:33 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1265, r0) 00:13:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolverh', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:33 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 299.089191][T12233] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolverl', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 299.151793][T12233] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:33 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:33 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1267, r0) 00:13:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolvert', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 299.347055][T12257] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:34 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1268, r0) 00:13:34 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1269, r0) 00:13:34 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1267, r0) 00:13:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolverz', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:34 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 299.942942][T12281] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:34 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1274, r0) 00:13:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:34 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1269, r0) 00:13:34 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 300.116832][T12297] Option ' ' to dns_resolver key: bad/missing value [ 300.139873][T12297] Option ' ' to dns_resolver key: bad/missing value [ 300.193922][T12308] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:34 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1276, r0) [ 300.248606][T12313] Option ' ' to dns_resolver key: bad/missing value 00:13:34 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(0x0, 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 300.319929][T12322] Option ' ' to dns_resolver key: bad/missing value 00:13:34 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 300.424018][T12336] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:35 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1277, r0) [ 300.464357][T12322] Option ' ' to dns_resolver key: bad/missing value 00:13:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:35 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:35 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x2, r0) 00:13:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:35 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:35 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1278, r0) 00:13:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:35 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 301.092089][T12357] Option ' ' to dns_resolver key: bad/missing value 00:13:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:35 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x1279, r0) 00:13:35 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x127a, r0) [ 301.259106][T12379] Option ' ' to dns_resolver key: bad/missing value 00:13:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 301.377555][T12379] Option ' ' to dns_resolver key: bad/missing value 00:13:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:36 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:36 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:36 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x127b, r0) 00:13:36 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:36 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x127c, r0) [ 301.959084][T12413] Option ' ' to dns_resolver key: bad/missing value [ 301.973588][T12416] FAULT_INJECTION: forcing a failure. [ 301.973588][T12416] name failslab, interval 1, probability 0, space 0, times 0 [ 301.988961][T12416] CPU: 1 PID: 12416 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 301.997234][T12416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.007978][T12416] Call Trace: [ 302.011299][T12416] dump_stack+0x172/0x1f0 [ 302.015685][T12416] should_fail.cold+0xa/0x15 [ 302.020295][T12416] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.026207][T12416] ? ___might_sleep+0x163/0x280 [ 302.031084][T12416] __should_failslab+0x121/0x190 [ 302.036049][T12416] ? sock_destroy_inode+0x60/0x60 [ 302.041107][T12416] should_failslab+0x9/0x14 [ 302.045632][T12416] kmem_cache_alloc+0x2b2/0x6f0 [ 302.050499][T12416] ? __might_sleep+0x95/0x190 [ 302.055195][T12416] ? sctp_id2assoc+0x203/0x2c0 [ 302.059970][T12416] ? sock_destroy_inode+0x60/0x60 [ 302.059986][T12416] sock_alloc_inode+0x1d/0x260 [ 302.060001][T12416] alloc_inode+0x66/0x190 [ 302.060016][T12416] new_inode_pseudo+0x19/0xf0 [ 302.060036][T12416] sock_alloc+0x41/0x270 [ 302.060052][T12416] __sock_create+0xc0/0x750 [ 302.060066][T12416] ? sctp_id2assoc+0x203/0x2c0 [ 302.060093][T12416] sock_create+0x7f/0xa0 [ 302.074233][T12416] sctp_do_peeloff+0x1a0/0x470 [ 302.074251][T12416] ? sctp_copy_sock+0xe50/0xe50 00:13:36 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 302.074271][T12416] ? lock_downgrade+0x880/0x880 [ 302.074290][T12416] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 302.074309][T12416] ? sctp_do_peeloff+0x470/0x470 [ 302.123035][T12416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.129759][T12416] ? _copy_from_user+0xdd/0x150 [ 302.135161][T12416] sctp_getsockopt+0x1ec1/0x673d [ 302.140117][T12416] ? __lock_acquire+0x548/0x3fb0 [ 302.145069][T12416] ? _parse_integer+0x190/0x190 [ 302.149948][T12416] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 302.156814][T12416] ? aa_label_sk_perm+0x101/0x560 [ 302.156833][T12416] ? aa_profile_af_perm+0x320/0x320 [ 302.156847][T12416] ? find_held_lock+0x35/0x130 [ 302.156869][T12416] ? __fget+0x35a/0x550 [ 302.176040][T12416] ? lock_downgrade+0x880/0x880 [ 302.176058][T12416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.176079][T12416] ? kasan_check_read+0x11/0x20 [ 302.176099][T12416] ? ___might_sleep+0x163/0x280 [ 302.176119][T12416] ? __might_sleep+0x95/0x190 [ 302.201740][T12416] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 302.207387][T12416] ? aa_sk_perm+0x288/0x880 [ 302.211943][T12416] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 302.217522][T12416] sock_common_getsockopt+0x9a/0xe0 [ 302.222761][T12416] ? sock_common_getsockopt+0x9a/0xe0 [ 302.228163][T12416] __sys_getsockopt+0x168/0x250 [ 302.233114][T12416] ? kernel_setsockopt+0x1e0/0x1e0 [ 302.238244][T12416] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.243719][T12416] ? do_syscall_64+0x26/0x610 [ 302.248412][T12416] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.254491][T12416] ? do_syscall_64+0x26/0x610 00:13:36 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 302.259200][T12416] __x64_sys_getsockopt+0xbe/0x150 [ 302.264336][T12416] do_syscall_64+0x103/0x610 [ 302.269571][T12416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.275481][T12416] RIP: 0033:0x457f29 [ 302.279391][T12416] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.299092][T12416] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 302.299108][T12416] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 302.299115][T12416] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 302.299121][T12416] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 302.299129][T12416] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 302.299136][T12416] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 [ 302.314307][T12416] socket: no more sockets 00:13:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x127d, r0) 00:13:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 302.384596][T12413] Option ' ' to dns_resolver key: bad/missing value 00:13:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x127e, r0) 00:13:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:37 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x0, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:37 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 302.857654][T12470] FAULT_INJECTION: forcing a failure. [ 302.857654][T12470] name failslab, interval 1, probability 0, space 0, times 0 [ 302.895148][T12470] CPU: 1 PID: 12470 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 302.902827][T12470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.912896][T12470] Call Trace: [ 302.912926][T12470] dump_stack+0x172/0x1f0 [ 302.912945][T12470] should_fail.cold+0xa/0x15 [ 302.912965][T12470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.912989][T12470] ? ___might_sleep+0x163/0x280 [ 302.930987][T12470] __should_failslab+0x121/0x190 [ 302.940776][T12470] ? sock_destroy_inode+0x60/0x60 [ 302.945818][T12470] should_failslab+0x9/0x14 00:13:37 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x0, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x127f, r0) 00:13:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 302.950368][T12470] kmem_cache_alloc_trace+0x2d1/0x760 [ 302.961011][T12470] ? kmem_cache_alloc+0x32e/0x6f0 [ 302.961038][T12470] ? __might_sleep+0x95/0x190 [ 302.961053][T12470] ? sock_destroy_inode+0x60/0x60 [ 302.961066][T12470] sock_alloc_inode+0x63/0x260 [ 302.961079][T12470] alloc_inode+0x66/0x190 [ 302.961094][T12470] new_inode_pseudo+0x19/0xf0 [ 302.961113][T12470] sock_alloc+0x41/0x270 [ 302.970826][T12470] __sock_create+0xc0/0x750 [ 302.970840][T12470] ? sctp_id2assoc+0x203/0x2c0 [ 302.970856][T12470] sock_create+0x7f/0xa0 [ 302.970871][T12470] sctp_do_peeloff+0x1a0/0x470 [ 302.970884][T12470] ? sctp_copy_sock+0xe50/0xe50 [ 302.970902][T12470] ? lock_downgrade+0x880/0x880 [ 302.970921][T12470] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 302.970941][T12470] ? sctp_do_peeloff+0x470/0x470 [ 302.980732][T12470] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.980748][T12470] ? _copy_from_user+0xdd/0x150 [ 302.980764][T12470] sctp_getsockopt+0x1ec1/0x673d [ 302.980780][T12470] ? __lock_acquire+0x548/0x3fb0 00:13:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c01, r0) [ 302.980799][T12470] ? _parse_integer+0x190/0x190 [ 302.989822][T12470] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 302.989836][T12470] ? aa_label_sk_perm+0x101/0x560 [ 302.989854][T12470] ? aa_profile_af_perm+0x320/0x320 [ 302.989866][T12470] ? find_held_lock+0x35/0x130 [ 302.989881][T12470] ? __fget+0x35a/0x550 [ 302.989905][T12470] ? lock_downgrade+0x880/0x880 [ 303.093110][T12470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.099368][T12470] ? kasan_check_read+0x11/0x20 [ 303.104228][T12470] ? ___might_sleep+0x163/0x280 [ 303.104247][T12470] ? __might_sleep+0x95/0x190 [ 303.104265][T12470] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 303.104279][T12470] ? aa_sk_perm+0x288/0x880 [ 303.104300][T12470] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 303.119554][T12470] sock_common_getsockopt+0x9a/0xe0 [ 303.119571][T12470] ? sock_common_getsockopt+0x9a/0xe0 [ 303.119591][T12470] __sys_getsockopt+0x168/0x250 [ 303.119606][T12470] ? kernel_setsockopt+0x1e0/0x1e0 [ 303.119627][T12470] ? trace_hardirqs_on_thunk+0x1a/0x1c 00:13:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c02, r0) [ 303.119642][T12470] ? do_syscall_64+0x26/0x610 [ 303.119658][T12470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.119678][T12470] ? do_syscall_64+0x26/0x610 [ 303.173702][T12470] __x64_sys_getsockopt+0xbe/0x150 [ 303.178829][T12470] do_syscall_64+0x103/0x610 [ 303.183437][T12470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.189333][T12470] RIP: 0033:0x457f29 00:13:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 303.193322][T12470] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.212929][T12470] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 303.212944][T12470] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 303.212953][T12470] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 303.212962][T12470] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 303.212972][T12470] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 303.212980][T12470] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 [ 303.252210][T12470] socket: no more sockets 00:13:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) capset(&(0x7f00000000c0)={0x20080522, r3}, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="7f256c197b40000000ada1cd127f81cd9730c21549ae2d7f4fa6d009de3489b7651ce541543f0ea9d4651b9c7d1a0c5b67cdad3dd4f0fe1be14f18fb8ccbf5a0e75c1b827f55186d3371bb3b5f4be0503a60881ebb533ce70a431104476ffb245eab6d3f5004d38dfbbd6401adb04ed704ca44f3bb08a12ffdfd9ff7791b130781ede53c1cec9184389501a73e4c97afd8fca313ba326bcd7cfd5eeddf8b4e5b514ef675430cad901c8789c17cf8e5f6668f7ec386b0a4dda1ff3b748be29288c5dd34654b1a990943d3f30f0ddb03d7551be2e30a2de41feeb73d84068c6ab34ff8c700735a96ff988faa7edce8103ff04154a8d05cda98f11bb7f05b720d74fd50c15571d0ddf4bd29a8e75e59904e9f259f72f478b70ffa3a0f80f77ddd964163edceaee83546a6d4749ab453fae584b935d4e3bb230f71732a86ab25216c1423186970b9f1c2c9df8c189be2812f2787f51c8586c2793af04d4cad327cc9dd097a7c7e9f37ef754011c1fa872b8f6357bc6aee"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:38 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c03, r0) 00:13:38 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x0, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:38 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 303.670345][T12512] validate_nla: 6 callbacks suppressed [ 303.670356][T12512] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:38 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:38 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c04, r0) [ 303.769744][T12518] FAULT_INJECTION: forcing a failure. [ 303.769744][T12518] name failslab, interval 1, probability 0, space 0, times 0 [ 303.817617][T12518] CPU: 1 PID: 12518 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 303.825294][T12518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.835361][T12518] Call Trace: [ 303.838759][T12518] dump_stack+0x172/0x1f0 [ 303.843117][T12518] should_fail.cold+0xa/0x15 [ 303.847733][T12518] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.853564][T12518] ? ___might_sleep+0x163/0x280 [ 303.858534][T12518] __should_failslab+0x121/0x190 [ 303.863488][T12518] should_failslab+0x9/0x14 00:13:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:38 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c05, r0) [ 303.868006][T12518] kmem_cache_alloc+0x2b2/0x6f0 [ 303.872868][T12518] ? inet6_create+0x2ea/0xf90 [ 303.877560][T12518] sk_prot_alloc+0x67/0x2e0 [ 303.882068][T12518] ? lock_downgrade+0x880/0x880 [ 303.886933][T12518] sk_alloc+0x39/0xf70 [ 303.891107][T12518] inet6_create+0x360/0xf90 [ 303.895666][T12518] __sock_create+0x3e6/0x750 [ 303.900020][T12528] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 303.900276][T12518] sock_create+0x7f/0xa0 [ 303.912678][T12518] sctp_do_peeloff+0x1a0/0x470 [ 303.917466][T12518] ? sctp_copy_sock+0xe50/0xe50 [ 303.922348][T12518] ? lock_downgrade+0x880/0x880 [ 303.927230][T12518] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 303.933847][T12518] ? sctp_do_peeloff+0x470/0x470 [ 303.938808][T12518] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.945179][T12518] ? _copy_from_user+0xdd/0x150 [ 303.950060][T12518] sctp_getsockopt+0x1ec1/0x673d [ 303.955025][T12518] ? __lock_acquire+0x548/0x3fb0 [ 303.959986][T12518] ? _parse_integer+0x190/0x190 00:13:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 303.964858][T12518] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 303.971731][T12518] ? aa_label_sk_perm+0x101/0x560 [ 303.976786][T12518] ? aa_profile_af_perm+0x320/0x320 [ 303.981998][T12518] ? find_held_lock+0x35/0x130 [ 303.986795][T12518] ? __fget+0x35a/0x550 [ 303.990978][T12518] ? lock_downgrade+0x880/0x880 [ 303.995948][T12518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.002831][T12518] ? kasan_check_read+0x11/0x20 [ 304.007707][T12518] ? ___might_sleep+0x163/0x280 [ 304.012586][T12518] ? __might_sleep+0x95/0x190 [ 304.017271][T12518] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 304.019667][T12536] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 304.022898][T12518] ? aa_sk_perm+0x288/0x880 [ 304.022922][T12518] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 304.022944][T12518] sock_common_getsockopt+0x9a/0xe0 [ 304.022959][T12518] ? sock_common_getsockopt+0x9a/0xe0 [ 304.022977][T12518] __sys_getsockopt+0x168/0x250 [ 304.023008][T12518] ? kernel_setsockopt+0x1e0/0x1e0 [ 304.061698][T12518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.067192][T12518] ? do_syscall_64+0x26/0x610 [ 304.067210][T12518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.067223][T12518] ? do_syscall_64+0x26/0x610 [ 304.067243][T12518] __x64_sys_getsockopt+0xbe/0x150 [ 304.067268][T12518] do_syscall_64+0x103/0x610 [ 304.078014][T12518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.078042][T12518] RIP: 0033:0x457f29 [ 304.087819][T12518] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.087828][T12518] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 304.087842][T12518] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 304.087851][T12518] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 304.087860][T12518] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 304.087869][T12518] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 304.087877][T12518] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 00:13:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:39 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 00:13:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:39 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 304.492012][T12550] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:39 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:39 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c07, r0) 00:13:39 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 304.687499][T12570] FAULT_INJECTION: forcing a failure. [ 304.687499][T12570] name failslab, interval 1, probability 0, space 0, times 0 [ 304.723194][T12576] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 304.739204][T12570] CPU: 1 PID: 12570 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 304.746886][T12570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.756961][T12570] Call Trace: [ 304.760276][T12570] dump_stack+0x172/0x1f0 [ 304.764655][T12570] should_fail.cold+0xa/0x15 [ 304.769276][T12570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.775105][T12570] ? ___might_sleep+0x163/0x280 [ 304.779980][T12570] __should_failslab+0x121/0x190 [ 304.784945][T12570] should_failslab+0x9/0x14 [ 304.789480][T12570] kmem_cache_alloc_trace+0x2d1/0x760 [ 304.794891][T12570] ? sk_prot_alloc+0x67/0x2e0 [ 304.799590][T12570] apparmor_sk_alloc_security+0x87/0x110 [ 304.805247][T12570] security_sk_alloc+0x7d/0xc0 [ 304.810039][T12570] sk_prot_alloc+0xa5/0x2e0 [ 304.814563][T12570] sk_alloc+0x39/0xf70 [ 304.818709][T12570] inet6_create+0x360/0xf90 [ 304.823262][T12570] __sock_create+0x3e6/0x750 [ 304.827974][T12570] sock_create+0x7f/0xa0 [ 304.832411][T12570] sctp_do_peeloff+0x1a0/0x470 [ 304.837285][T12570] ? sctp_copy_sock+0xe50/0xe50 [ 304.842158][T12570] ? lock_downgrade+0x880/0x880 [ 304.847041][T12570] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 304.853651][T12570] ? sctp_do_peeloff+0x470/0x470 [ 304.858604][T12570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.864879][T12570] ? _copy_from_user+0xdd/0x150 [ 304.869755][T12570] sctp_getsockopt+0x1ec1/0x673d [ 304.874718][T12570] ? __lock_acquire+0x548/0x3fb0 [ 304.879669][T12570] ? _parse_integer+0x190/0x190 [ 304.884548][T12570] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 304.891410][T12570] ? aa_label_sk_perm+0x101/0x560 [ 304.896459][T12570] ? aa_profile_af_perm+0x320/0x320 [ 304.901757][T12570] ? find_held_lock+0x35/0x130 [ 304.906636][T12570] ? __fget+0x35a/0x550 [ 304.910817][T12570] ? lock_downgrade+0x880/0x880 [ 304.915703][T12570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.921988][T12570] ? kasan_check_read+0x11/0x20 [ 304.926868][T12570] ? ___might_sleep+0x163/0x280 [ 304.931836][T12570] ? __might_sleep+0x95/0x190 [ 304.936547][T12570] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 304.942207][T12570] ? aa_sk_perm+0x288/0x880 [ 304.946740][T12570] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 304.952312][T12570] sock_common_getsockopt+0x9a/0xe0 [ 304.957542][T12570] ? sock_common_getsockopt+0x9a/0xe0 [ 304.962944][T12570] __sys_getsockopt+0x168/0x250 [ 304.967832][T12570] ? kernel_setsockopt+0x1e0/0x1e0 [ 304.973069][T12570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.978562][T12570] ? do_syscall_64+0x26/0x610 [ 304.983269][T12570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.989361][T12570] ? do_syscall_64+0x26/0x610 [ 304.994148][T12570] __x64_sys_getsockopt+0xbe/0x150 [ 304.999282][T12570] do_syscall_64+0x103/0x610 [ 305.006038][T12570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.011948][T12570] RIP: 0033:0x457f29 [ 305.015878][T12570] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:13:39 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 305.035606][T12570] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 305.044037][T12570] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 305.052045][T12570] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 305.060033][T12570] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 305.068040][T12570] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 305.076022][T12570] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 [ 305.175641][T12585] dns_resolver_preparse: 9 callbacks suppressed [ 305.175653][T12585] Option ' ' to dns_resolver key: bad/missing value 00:13:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\xff', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:39 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c09, r0) 00:13:39 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 305.353426][T12597] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:40 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:40 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 305.507892][T12616] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 305.556866][T12622] FAULT_INJECTION: forcing a failure. [ 305.556866][T12622] name failslab, interval 1, probability 0, space 0, times 0 [ 305.567808][T12623] Option ' ' to dns_resolver key: bad/missing value [ 305.589621][T12622] CPU: 0 PID: 12622 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 305.597316][T12622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.607375][T12622] Call Trace: [ 305.610688][T12622] dump_stack+0x172/0x1f0 [ 305.615038][T12622] should_fail.cold+0xa/0x15 [ 305.615072][T12622] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.615100][T12622] ? ___might_sleep+0x163/0x280 [ 305.630419][T12622] __should_failslab+0x121/0x190 [ 305.630440][T12622] should_failslab+0x9/0x14 [ 305.630454][T12622] kmem_cache_alloc_trace+0x2d1/0x760 [ 305.630476][T12622] sctp_endpoint_new+0x79/0xed0 [ 305.630494][T12622] sctp_init_sock+0xc2e/0x1360 [ 305.630518][T12622] ? kasan_check_write+0x14/0x20 [ 305.630542][T12622] ? sock_init_data+0x8de/0xc70 [ 305.630561][T12622] ? sctp_destroy_sock+0x3e0/0x3e0 [ 305.669872][T12622] inet6_create+0x9cd/0xf90 [ 305.674398][T12622] __sock_create+0x3e6/0x750 [ 305.679006][T12622] sock_create+0x7f/0xa0 [ 305.683268][T12622] sctp_do_peeloff+0x1a0/0x470 [ 305.683283][T12622] ? sctp_copy_sock+0xe50/0xe50 [ 305.683309][T12622] ? lock_downgrade+0x880/0x880 [ 305.692933][T12622] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 305.704444][T12622] ? sctp_do_peeloff+0x470/0x470 [ 305.709405][T12622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.715661][T12622] ? _copy_from_user+0xdd/0x150 [ 305.715681][T12622] sctp_getsockopt+0x1ec1/0x673d [ 305.715706][T12622] ? __lock_acquire+0x548/0x3fb0 [ 305.730600][T12622] ? _parse_integer+0x190/0x190 [ 305.735479][T12622] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 305.742354][T12622] ? aa_label_sk_perm+0x101/0x560 [ 305.747399][T12622] ? aa_profile_af_perm+0x320/0x320 [ 305.752602][T12622] ? find_held_lock+0x35/0x130 [ 305.752619][T12622] ? __fget+0x35a/0x550 [ 305.752640][T12622] ? lock_downgrade+0x880/0x880 [ 305.752664][T12622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.772666][T12622] ? kasan_check_read+0x11/0x20 [ 305.777554][T12622] ? ___might_sleep+0x163/0x280 [ 305.782423][T12622] ? __might_sleep+0x95/0x190 [ 305.787115][T12622] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 305.792775][T12622] ? aa_sk_perm+0x288/0x880 [ 305.797318][T12622] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 305.802892][T12622] sock_common_getsockopt+0x9a/0xe0 [ 305.808109][T12622] ? sock_common_getsockopt+0x9a/0xe0 [ 305.813503][T12622] __sys_getsockopt+0x168/0x250 [ 305.818412][T12622] ? kernel_setsockopt+0x1e0/0x1e0 [ 305.823567][T12622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 305.829047][T12622] ? do_syscall_64+0x26/0x610 [ 305.833741][T12622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.839829][T12622] ? do_syscall_64+0x26/0x610 [ 305.844549][T12622] __x64_sys_getsockopt+0xbe/0x150 [ 305.849692][T12622] do_syscall_64+0x103/0x610 [ 305.854309][T12622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.860215][T12622] RIP: 0033:0x457f29 [ 305.864131][T12622] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.883747][T12622] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 305.892195][T12622] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 305.900182][T12622] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 00:13:40 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c0a, r0) 00:13:40 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 305.908258][T12622] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 305.916257][T12622] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 305.924250][T12622] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 [ 305.937924][T12636] Option ' ' to dns_resolver key: bad/missing value [ 306.005796][T12636] Option ' ' to dns_resolver key: bad/missing value 00:13:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = getpid() waitid(0x1, r3, 0x0, 0x0, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) sync_file_range(r0, 0x7fff, 0xa67, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r6 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:40 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c48, r0) 00:13:40 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 306.209670][T12647] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 306.218306][T12652] Option ' ' to dns_resolver key: bad/missing value 00:13:40 executing program 0 (fault-call:3 fault-nth:5): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:40 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c4c, r0) 00:13:40 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 306.339812][T12652] Option ' ' to dns_resolver key: bad/missing value 00:13:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:41 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 306.417012][T12673] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 306.432468][T12677] FAULT_INJECTION: forcing a failure. [ 306.432468][T12677] name failslab, interval 1, probability 0, space 0, times 0 00:13:41 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c68, r0) [ 306.473461][T12673] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 306.513811][T12685] Option ' ' to dns_resolver key: bad/missing value [ 306.527956][T12677] CPU: 1 PID: 12677 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 306.535645][T12677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.545710][T12677] Call Trace: [ 306.549013][T12677] dump_stack+0x172/0x1f0 [ 306.553361][T12677] should_fail.cold+0xa/0x15 [ 306.557965][T12677] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 306.563776][T12677] ? ___might_sleep+0x163/0x280 [ 306.568635][T12677] __should_failslab+0x121/0x190 [ 306.573584][T12677] should_failslab+0x9/0x14 [ 306.578123][T12677] kmem_cache_alloc_trace+0x2d1/0x760 [ 306.583517][T12677] sctp_endpoint_new+0x100/0xed0 [ 306.588478][T12677] sctp_init_sock+0xc2e/0x1360 [ 306.593252][T12677] ? kasan_check_write+0x14/0x20 [ 306.598194][T12677] ? sock_init_data+0x8de/0xc70 [ 306.603067][T12677] ? sctp_destroy_sock+0x3e0/0x3e0 [ 306.608187][T12677] inet6_create+0x9cd/0xf90 [ 306.612706][T12677] __sock_create+0x3e6/0x750 [ 306.617316][T12677] sock_create+0x7f/0xa0 [ 306.621567][T12677] sctp_do_peeloff+0x1a0/0x470 [ 306.626336][T12677] ? sctp_copy_sock+0xe50/0xe50 [ 306.631197][T12677] ? lock_downgrade+0x880/0x880 [ 306.636145][T12677] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 306.642849][T12677] ? sctp_do_peeloff+0x470/0x470 [ 306.647886][T12677] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.654131][T12677] ? _copy_from_user+0xdd/0x150 [ 306.658991][T12677] sctp_getsockopt+0x1ec1/0x673d [ 306.663930][T12677] ? __lock_acquire+0x548/0x3fb0 [ 306.668874][T12677] ? _parse_integer+0x190/0x190 [ 306.673734][T12677] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 306.680582][T12677] ? aa_label_sk_perm+0x101/0x560 [ 306.685620][T12677] ? aa_profile_af_perm+0x320/0x320 [ 306.690821][T12677] ? find_held_lock+0x35/0x130 [ 306.695586][T12677] ? __fget+0x35a/0x550 [ 306.699766][T12677] ? lock_downgrade+0x880/0x880 [ 306.704626][T12677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.710878][T12677] ? kasan_check_read+0x11/0x20 [ 306.715742][T12677] ? ___might_sleep+0x163/0x280 [ 306.720601][T12677] ? __might_sleep+0x95/0x190 [ 306.725293][T12677] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 306.730933][T12677] ? aa_sk_perm+0x288/0x880 [ 306.735455][T12677] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 306.741013][T12677] sock_common_getsockopt+0x9a/0xe0 [ 306.746229][T12677] ? sock_common_getsockopt+0x9a/0xe0 [ 306.751615][T12677] __sys_getsockopt+0x168/0x250 [ 306.756475][T12677] ? kernel_setsockopt+0x1e0/0x1e0 [ 306.761604][T12677] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 306.767071][T12677] ? do_syscall_64+0x26/0x610 [ 306.771751][T12677] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.777820][T12677] ? do_syscall_64+0x26/0x610 [ 306.782502][T12677] __x64_sys_getsockopt+0xbe/0x150 [ 306.787634][T12677] do_syscall_64+0x103/0x610 [ 306.792228][T12677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.798111][T12677] RIP: 0033:0x457f29 [ 306.802002][T12677] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.821610][T12677] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 306.830043][T12677] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 306.838019][T12677] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 306.845996][T12677] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 306.853972][T12677] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 306.861947][T12677] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 00:13:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = getpid() waitid(0x1, r2, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) capset(&(0x7f00000000c0)={0x20080522, r2}, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r3, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:41 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:41 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c6c, r0) 00:13:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:41 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 307.077761][T12705] Option ' ' to dns_resolver key: bad/missing value 00:13:41 executing program 0 (fault-call:3 fault-nth:6): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:41 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:41 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:41 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c74, r0) 00:13:41 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) [ 307.298628][T12722] Option ' ' to dns_resolver key: bad/missing value 00:13:41 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c7a, r0) [ 307.387432][T12732] FAULT_INJECTION: forcing a failure. [ 307.387432][T12732] name failslab, interval 1, probability 0, space 0, times 0 [ 307.403235][T12734] Option ' ' to dns_resolver key: bad/missing value [ 307.424439][T12732] CPU: 0 PID: 12732 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 307.432120][T12732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.442193][T12732] Call Trace: [ 307.445522][T12732] dump_stack+0x172/0x1f0 [ 307.449893][T12732] should_fail.cold+0xa/0x15 [ 307.454545][T12732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.460403][T12732] ? ___might_sleep+0x163/0x280 [ 307.465286][T12732] __should_failslab+0x121/0x190 [ 307.470341][T12732] should_failslab+0x9/0x14 [ 307.474869][T12732] kmem_cache_alloc_trace+0x2d1/0x760 [ 307.480351][T12732] ? sctp_endpoint_lookup_assoc+0x290/0x290 [ 307.486270][T12732] sctp_auth_shkey_create+0x87/0x1b0 [ 307.491589][T12732] sctp_endpoint_new+0x518/0xed0 [ 307.496566][T12732] sctp_init_sock+0xc2e/0x1360 [ 307.501346][T12732] ? kasan_check_write+0x14/0x20 [ 307.506381][T12732] ? sock_init_data+0x8de/0xc70 [ 307.511327][T12732] ? sctp_destroy_sock+0x3e0/0x3e0 [ 307.511345][T12732] inet6_create+0x9cd/0xf90 [ 307.511366][T12732] __sock_create+0x3e6/0x750 [ 307.511383][T12732] sock_create+0x7f/0xa0 [ 307.511398][T12732] sctp_do_peeloff+0x1a0/0x470 [ 307.511412][T12732] ? sctp_copy_sock+0xe50/0xe50 [ 307.511435][T12732] ? lock_downgrade+0x880/0x880 [ 307.521077][T12732] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 307.521092][T12732] ? sctp_do_peeloff+0x470/0x470 [ 307.521111][T12732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.521125][T12732] ? _copy_from_user+0xdd/0x150 [ 307.521141][T12732] sctp_getsockopt+0x1ec1/0x673d [ 307.521156][T12732] ? __lock_acquire+0x548/0x3fb0 [ 307.521166][T12732] ? _parse_integer+0x190/0x190 [ 307.521185][T12732] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 307.521206][T12732] ? aa_label_sk_perm+0x101/0x560 [ 307.530058][T12732] ? aa_profile_af_perm+0x320/0x320 [ 307.530072][T12732] ? find_held_lock+0x35/0x130 [ 307.530100][T12732] ? __fget+0x35a/0x550 [ 307.530119][T12732] ? lock_downgrade+0x880/0x880 [ 307.530132][T12732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.530149][T12732] ? kasan_check_read+0x11/0x20 [ 307.530167][T12732] ? ___might_sleep+0x163/0x280 [ 307.530183][T12732] ? __might_sleep+0x95/0x190 [ 307.530201][T12732] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 307.530213][T12732] ? aa_sk_perm+0x288/0x880 [ 307.530234][T12732] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 307.530254][T12732] sock_common_getsockopt+0x9a/0xe0 [ 307.530267][T12732] ? sock_common_getsockopt+0x9a/0xe0 [ 307.530284][T12732] __sys_getsockopt+0x168/0x250 [ 307.530299][T12732] ? kernel_setsockopt+0x1e0/0x1e0 [ 307.530318][T12732] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.530333][T12732] ? do_syscall_64+0x26/0x610 [ 307.530350][T12732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.530363][T12732] ? do_syscall_64+0x26/0x610 [ 307.530380][T12732] __x64_sys_getsockopt+0xbe/0x150 [ 307.530403][T12732] do_syscall_64+0x103/0x610 [ 307.540115][T12732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.540127][T12732] RIP: 0033:0x457f29 [ 307.540142][T12732] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.540149][T12732] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 307.540162][T12732] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 307.540169][T12732] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 307.540177][T12732] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 307.540185][T12732] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 307.540192][T12732] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 00:13:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = getpid() waitid(0x1, r2, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) capset(&(0x7f00000000c0)={0x20080522, r2}, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r3, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:42 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:42 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x5421, r0) 00:13:42 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:42 executing program 0 (fault-call:3 fault-nth:7): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 00:13:42 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x5450, r0) 00:13:42 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:42 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) 00:13:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:42 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x5451, r0) [ 308.270378][T12780] FAULT_INJECTION: forcing a failure. [ 308.270378][T12780] name failslab, interval 1, probability 0, space 0, times 0 [ 308.317033][T12780] CPU: 0 PID: 12780 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 308.324706][T12780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.334934][T12780] Call Trace: [ 308.338262][T12780] dump_stack+0x172/0x1f0 [ 308.342624][T12780] should_fail.cold+0xa/0x15 [ 308.347237][T12780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.353159][T12780] ? ___might_sleep+0x163/0x280 [ 308.358116][T12780] __should_failslab+0x121/0x190 [ 308.363081][T12780] should_failslab+0x9/0x14 [ 308.367595][T12780] kmem_cache_alloc_trace+0x2d1/0x760 [ 308.372975][T12780] ? mark_held_locks+0xa4/0xf0 [ 308.377779][T12780] sctp_add_bind_addr+0x9f/0x3a0 [ 308.382765][T12780] sctp_bind_addr_dup+0xdd/0x140 [ 308.382784][T12780] sctp_sock_migrate+0x525/0x14c0 [ 308.382805][T12780] ? kasan_check_read+0x11/0x20 [ 308.382826][T12780] sctp_do_peeloff+0x2f5/0x470 [ 308.392821][T12780] ? sctp_copy_sock+0xe50/0xe50 [ 308.392840][T12780] ? lock_downgrade+0x880/0x880 [ 308.392860][T12780] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 308.392873][T12780] ? sctp_do_peeloff+0x470/0x470 [ 308.392890][T12780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.392905][T12780] ? _copy_from_user+0xdd/0x150 [ 308.392923][T12780] sctp_getsockopt+0x1ec1/0x673d [ 308.392937][T12780] ? __lock_acquire+0x548/0x3fb0 [ 308.392956][T12780] ? _parse_integer+0x190/0x190 [ 308.449789][T12780] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 308.449804][T12780] ? aa_label_sk_perm+0x101/0x560 [ 308.449823][T12780] ? aa_profile_af_perm+0x320/0x320 [ 308.461723][T12780] ? find_held_lock+0x35/0x130 [ 308.461741][T12780] ? __fget+0x35a/0x550 [ 308.461760][T12780] ? lock_downgrade+0x880/0x880 [ 308.461773][T12780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.461791][T12780] ? kasan_check_read+0x11/0x20 [ 308.461813][T12780] ? ___might_sleep+0x163/0x280 [ 308.461840][T12780] ? __might_sleep+0x95/0x190 [ 308.461866][T12780] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 308.461879][T12780] ? aa_sk_perm+0x288/0x880 [ 308.461906][T12780] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 308.517179][T12780] sock_common_getsockopt+0x9a/0xe0 [ 308.522390][T12780] ? sock_common_getsockopt+0x9a/0xe0 [ 308.527870][T12780] __sys_getsockopt+0x168/0x250 [ 308.532765][T12780] ? kernel_setsockopt+0x1e0/0x1e0 [ 308.538002][T12780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 308.543458][T12780] ? do_syscall_64+0x26/0x610 [ 308.548233][T12780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.554305][T12780] ? do_syscall_64+0x26/0x610 [ 308.558975][T12780] __x64_sys_getsockopt+0xbe/0x150 [ 308.564085][T12780] do_syscall_64+0x103/0x610 [ 308.568682][T12780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.574594][T12780] RIP: 0033:0x457f29 [ 308.578496][T12780] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.598106][T12780] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 308.606534][T12780] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 308.614627][T12780] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 308.622722][T12780] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 308.630695][T12780] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 308.638695][T12780] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 [ 308.651680][T12780] kasan: CONFIG_KASAN_INLINE enabled [ 308.657436][T12780] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 308.666827][T12780] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 308.673782][T12780] CPU: 0 PID: 12780 Comm: syz-executor.0 Not tainted 5.0.0+ #20 [ 308.681413][T12780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.691527][T12780] RIP: 0010:sctp_assoc_rwnd_increase+0x34/0x520 [ 308.697825][T12780] Code: 41 54 49 89 fc 53 89 f3 48 83 ec 10 e8 55 11 ef fa 49 8d bc 24 60 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 2f 04 00 00 45 8b ac 24 60 06 [ 308.717419][T12780] RSP: 0018:ffff88804dfaf6f8 EFLAGS: 00010203 [ 308.723496][T12780] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90006004000 [ 308.731560][T12780] RDX: 00000000000000cb RSI: ffffffff868152db RDI: 000000000000065f [ 308.739528][T12780] RBP: ffff88804dfaf730 R08: ffff888097d38380 R09: ffff888097d38c48 [ 308.747601][T12780] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffffffffff [ 308.755578][T12780] R13: 0000000000000000 R14: ffff888094a69000 R15: 0000000000000000 [ 308.764527][T12780] FS: 00007f0195171700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 308.773559][T12780] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 308.780153][T12780] CR2: 0000000000625208 CR3: 000000009293a000 CR4: 00000000001406f0 [ 308.788137][T12780] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 308.796127][T12780] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 308.804105][T12780] Call Trace: [ 308.807404][T12780] sctp_ulpevent_free+0x21f/0x4e0 [ 308.812446][T12780] sctp_queue_purge_ulpevents+0xc4/0x110 [ 308.818078][T12780] sctp_close+0x148/0x860 [ 308.822407][T12780] ? rcu_read_lock_sched_held+0x110/0x130 [ 308.828152][T12780] ? mark_held_locks+0xa4/0xf0 [ 308.832919][T12780] ? sctp_init_sock+0x1360/0x1360 [ 308.837954][T12780] ? sctp_add_bind_addr+0x2d3/0x3a0 [ 308.843257][T12780] ? ip_mc_drop_socket+0x211/0x270 [ 308.848382][T12780] ? sctp_bind_addr_dup+0xf3/0x140 [ 308.853499][T12780] inet_release+0x105/0x1f0 [ 308.858026][T12780] inet6_release+0x53/0x80 [ 308.862448][T12780] __sock_release+0x1fe/0x2b0 [ 308.867129][T12780] sock_release+0x18/0x20 [ 308.871468][T12780] sctp_do_peeloff+0x38a/0x470 [ 308.876248][T12780] ? sctp_copy_sock+0xe50/0xe50 [ 308.881208][T12780] ? lock_downgrade+0x880/0x880 [ 308.886067][T12780] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 308.892677][T12780] ? sctp_do_peeloff+0x470/0x470 [ 308.897632][T12780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.903913][T12780] ? _copy_from_user+0xdd/0x150 [ 308.908794][T12780] sctp_getsockopt+0x1ec1/0x673d [ 308.913740][T12780] ? __lock_acquire+0x548/0x3fb0 [ 308.918683][T12780] ? _parse_integer+0x190/0x190 [ 308.923820][T12780] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 308.930683][T12780] ? aa_label_sk_perm+0x101/0x560 [ 308.935726][T12780] ? aa_profile_af_perm+0x320/0x320 [ 308.940928][T12780] ? find_held_lock+0x35/0x130 [ 308.945695][T12780] ? __fget+0x35a/0x550 [ 308.950216][T12780] ? lock_downgrade+0x880/0x880 [ 308.958563][T12780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.965269][T12780] ? kasan_check_read+0x11/0x20 [ 308.970147][T12780] ? ___might_sleep+0x163/0x280 [ 308.975014][T12780] ? __might_sleep+0x95/0x190 [ 308.979721][T12780] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 308.985360][T12780] ? aa_sk_perm+0x288/0x880 [ 308.989875][T12780] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 308.995526][T12780] sock_common_getsockopt+0x9a/0xe0 [ 309.000757][T12780] ? sock_common_getsockopt+0x9a/0xe0 [ 309.008518][T12780] __sys_getsockopt+0x168/0x250 [ 309.013398][T12780] ? kernel_setsockopt+0x1e0/0x1e0 [ 309.018536][T12780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 309.024124][T12780] ? do_syscall_64+0x26/0x610 [ 309.028831][T12780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.034908][T12780] ? do_syscall_64+0x26/0x610 [ 309.039597][T12780] __x64_sys_getsockopt+0xbe/0x150 [ 309.044728][T12780] do_syscall_64+0x103/0x610 [ 309.049330][T12780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.055224][T12780] RIP: 0033:0x457f29 [ 309.059140][T12780] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.078749][T12780] RSP: 002b:00007f0195170c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 309.087187][T12780] RAX: ffffffffffffffda RBX: 00007f0195170c90 RCX: 0000000000457f29 [ 309.095169][T12780] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 309.103147][T12780] RBP: 000000000073bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 309.111127][T12780] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f01951716d4 [ 309.119190][T12780] R13: 00000000004c9868 R14: 00000000004d02b8 R15: 0000000000000004 [ 309.127270][T12780] Modules linked in: [ 309.138653][T12780] ---[ end trace 62e894c178dafd6e ]--- [ 309.144157][T12780] RIP: 0010:sctp_assoc_rwnd_increase+0x34/0x520 00:13:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$admmidi(0x0, 0x805, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = getpid() waitid(0x1, r2, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000380)={0x0, 0xffffffff, 0x5}) capset(&(0x7f00000000c0)={0x20080522, r2}, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000200)={0x0, @capture={0x1000, 0x1, {0x1}, 0x4853, 0x5}}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='broute\x00', 0x7, 0x3) sendmmsg(r3, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 00:13:43 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="e8d3e4e6aa0ee73caf13dabf8fc8af38", 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x24000, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_genetlink_get_family_id$tipc(0x0) 00:13:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) 00:13:43 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x5452, r0) 00:13:43 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14c) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000000) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x3, 0x10800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x555, 0x0, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000240)=0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a31daf0c1d6d62b87afdf6d6ad3210808627cc26a181e76289365a030a72d48321a78a612818bea93c39f9767c9a2d4713377bf12d17d748239c2aabc6dc4f8d118393258eecb8054294ca69fc71bda3b67e0769fed2a5cdd4436e4abb42cb0f4f646511fed8b03a424e1b96b1e2c65a15fa9d41c3319241f9fb6960a3c3269db45"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, 0x0}, 0x4000) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) [ 309.152385][T12780] Code: 41 54 49 89 fc 53 89 f3 48 83 ec 10 e8 55 11 ef fa 49 8d bc 24 60 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 2f 04 00 00 45 8b ac 24 60 06 [ 309.175632][T12780] RSP: 0018:ffff88804dfaf6f8 EFLAGS: 00010203 [ 309.181363][ T3874] kobject: 'loop1' (00000000bf6d6f57): kobject_uevent_env [ 309.203546][T12791] validate_nla: 6 callbacks suppressed [ 309.203557][T12791] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:13:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x4}]]}}}]}, 0x38}}, 0x0) [ 309.206617][ T3874] kobject: 'loop1' (00000000bf6d6f57): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 309.248934][T12780] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90006004000 [ 309.275695][T12780] RDX: 00000000000000cb RSI: ffffffff868152db RDI: 000000000000065f [ 309.285917][T12804] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 309.289890][ T3874] kobject: 'loop2' (0000000032cdf708): kobject_uevent_env [ 309.301564][T12780] RBP: ffff88804dfaf730 R08: ffff888097d38380 R09: ffff888097d38c48 [ 309.316173][ T3874] kobject: 'loop2' (0000000032cdf708): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 309.317417][T12780] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffffffffff [ 309.334538][ T3874] kobject: 'loop4' (000000007c87f490): kobject_uevent_env [ 309.334822][T12780] R13: 0000000000000000 R14: ffff888094a69000 R15: 0000000000000000 [ 309.342201][ T3874] kobject: 'loop4' (000000007c87f490): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 309.349905][T12780] FS: 00007f0195171700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 309.363246][ T3874] kobject: 'loop5' (00000000f5e1cf73): kobject_uevent_env [ 309.369318][T12780] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 309.369327][T12780] CR2: 00007ffd184eccec CR3: 000000009293a000 CR4: 00000000001406f0 [ 309.369340][T12780] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 309.369358][T12780] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 309.376958][ T3874] kobject: 'loop5' (00000000f5e1cf73): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 309.383441][T12780] Kernel panic - not syncing: Fatal exception [ 309.395704][ T3874] kobject: 'loop3' (00000000c5ceaa84): kobject_uevent_env [ 309.400401][T12780] Kernel Offset: disabled [ 309.436135][T12780] Rebooting in 86400 seconds..