ARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6) 09:07:19 executing program 1: 09:07:19 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x324, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:19 executing program 5: 09:07:19 executing program 3: 09:07:19 executing program 1: 09:07:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7) 09:07:19 executing program 3: 09:07:19 executing program 1: 09:07:19 executing program 5: 09:07:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x8) 09:07:20 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:20 executing program 3: 09:07:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$FIONREAD(r0, 0x5437, 0x0) 09:07:22 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x325, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:22 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) syncfs(0xffffffffffffffff) dup3(r0, r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 09:07:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xa) 09:07:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@mpls_getroute={0x1c, 0x12, 0xffffff1f, 0x0, 0x0, {0x1e}}, 0x1c}}, 0x0) 09:07:22 executing program 5: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0x1275, 0x0) 09:07:22 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 966.453722][ T1613] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 966.489827][ T1617] validate_nla: 4 callbacks suppressed [ 966.489839][ T1617] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:07:22 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 966.505257][ T1619] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:07:22 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000080)) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) r4 = geteuid() ioprio_set$uid(0x3, r4, 0x10000) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r5 = epoll_create(0x4) r6 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r1, &(0x7f0000c7f000)) r7 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000d5dff4)) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x20040) prctl$PR_SVE_GET_VL(0x33, 0x1265b) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r5, &(0x7f000050aff4)) r8 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x101000) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x3, 0x2800) ioctl$VIDIOC_G_INPUT(r8, 0x80045626, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_DELDEST(r8, 0x0, 0x488, &(0x7f0000000140)={{0x0, @dev={0xac, 0x14, 0x14, 0x1f}, 0x4e24, 0x4, 'dh\x00', 0x9, 0xff, 0x49}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x4e21, 0x2, 0xffff, 0x9, 0x9}}, 0x44) 09:07:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xe) [ 966.663900][ T1633] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:23 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf) 09:07:23 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x326, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:23 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x10) 09:07:23 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 967.335595][ T1656] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x48) 09:07:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x20) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x4) r5 = epoll_create(0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r6, &(0x7f0000000480), 0x1000000000000237, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r7 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) r8 = socket(0x1b, 0x6, 0xfffffffffffffffb) setsockopt$nfc_llcp_NFC_LLCP_RW(r8, 0x118, 0x0, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet6_buf(r6, 0x29, 0xfc, &(0x7f0000000100)=""/212, &(0x7f0000000200)=0xd4) ioctl$SCSI_IOCTL_GET_IDLUN(r6, 0x5382, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r4, &(0x7f000050aff4)) 09:07:23 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4c) [ 967.497240][ T1668] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 967.586062][ T1675] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x60) 09:07:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x20) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x4) r5 = epoll_create(0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r6, &(0x7f0000000480), 0x1000000000000237, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r7 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) r8 = socket(0x1b, 0x6, 0xfffffffffffffffb) setsockopt$nfc_llcp_NFC_LLCP_RW(r8, 0x118, 0x0, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet6_buf(r6, 0x29, 0xfc, &(0x7f0000000100)=""/212, &(0x7f0000000200)=0xd4) ioctl$SCSI_IOCTL_GET_IDLUN(r6, 0x5382, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r4, &(0x7f000050aff4)) 09:07:24 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 967.814070][ T1685] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:24 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:24 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x327, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x68) 09:07:24 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:24 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:24 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6c) [ 968.251472][ T1708] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 968.336890][ T1717] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x74) [ 968.539141][ T1723] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7a) 09:07:25 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) 09:07:25 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 968.888201][ T1728] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf0) 09:07:25 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:25 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x328, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:25 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x129) 09:07:25 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x300) 09:07:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x500) 09:07:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x600) 09:07:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x700) 09:07:26 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) 09:07:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xa00) 09:07:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xe00) 09:07:26 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:26 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:26 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:26 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf00) 09:07:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x2000) 09:07:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x2901) 09:07:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x3f00) 09:07:27 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) 09:07:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4000) 09:07:27 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) 09:07:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4800) 09:07:27 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x32a, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:27 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:27 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4c00) 09:07:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6000) 09:07:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6800) 09:07:28 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 971.752274][ T1859] validate_nla: 16 callbacks suppressed [ 971.752286][ T1859] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 971.876412][ T1859] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6c00) 09:07:28 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:28 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:28 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x32b, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) [ 972.124289][ T1869] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7400) 09:07:28 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 972.383012][ T1883] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7a00) [ 972.543046][ T1890] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf000) 09:07:29 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x34000) [ 972.880972][ T1897] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:29 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 972.974708][ T1902] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x400300) 09:07:29 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x32c, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:29 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 973.163519][ T1914] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 973.249293][ T1914] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf0ffff) 09:07:29 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x20) unlink(0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000480)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x48, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b48931f6ff6d"}) read(r1, &(0x7f0000000000), 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, &(0x7f0000000780)}) lseek(r1, 0x0, 0x4) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0xef, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0663044001000000a306c8f29cc8cd1409fc14f32f7ce6cf61c5c77b946b2e9e01e79450dddac2a15557108ab0d1165938cdeb5022a8911319d846ed96b0d66c97babdabeaa78f48179ec83c1ce0a62a0946440c28789566621ae6205624377eb756e92fb84522bef8038c3d9b665e2a9ff9061bd1301bc86b7efe0d4b17706d7bd6c344d6021a1c0e3da3249580f478745e0be6ee99ff6bad9e7e662c73d63b3f77f8cf8cd896b3675e8b4b391aa21b0c77a0c6f587f77739f43cec3d93b3fb44d655a6be675b286bf502f07636ad407cb2ea90f7a61e8bb675bc9885f55940dc4f4d68374b304975b595738f3369"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, &(0x7f00000007c0)}) 09:07:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x1000000) 09:07:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$isdn(0x22, 0x3, 0x3) r0 = msgget$private(0x0, 0x141) msgrcv(r0, 0x0, 0xfffffebc, 0x1, 0x0) [ 973.484131][ T1933] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x2000000) 09:07:30 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) fsetxattr$trusted_overlay_origin(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) msgget$private(0x0, 0x200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) restart_syscall() setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x3000000) 09:07:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4000000) 09:07:30 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x32d, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:30 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x80000000}}, 0x800, 0x4, 0x20, 0xfffffffffffffffa, 0x20}, &(0x7f0000000140)=0x98) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x5000000) 09:07:30 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6000000) 09:07:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7000000) 09:07:30 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x8000000) 09:07:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xa000000) 09:07:31 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) preadv(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/243, 0xf3}, {&(0x7f00000001c0)=""/130, 0x82}, {&(0x7f0000000280)=""/48, 0x30}, {&(0x7f00000002c0)=""/181, 0xb5}, {&(0x7f0000000380)=""/224, 0xe0}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/131, 0x83}, {&(0x7f0000000580)=""/190, 0xbe}], 0x8, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x785400, 0x0) r1 = dup(r0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r2 = fcntl$dupfd(r1, 0x0, r1) bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) 09:07:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xe000000) 09:07:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf000000) 09:07:31 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x32e, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) 09:07:31 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:31 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x10000000) 09:07:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x20000000) 09:07:31 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x29010000) 09:07:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x3f000000) 09:07:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x40000000) 09:07:32 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:32 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:32 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x48000000) 09:07:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) 09:07:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4c000000) 09:07:33 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:33 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) 09:07:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x60000000) 09:07:33 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x330, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) [ 977.111263][ T2099] validate_nla: 19 callbacks suppressed [ 977.111273][ T2099] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:33 executing program 3: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:33 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:33 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x80000000005, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000040)=0x100000001, 0x3b3) arch_prctl$ARCH_SET_GS(0x1001, 0xf04991f) 09:07:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) 09:07:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x68000000) 09:07:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000002700)={0x1, 0x0, [0x10000000000570]}) getsockopt$inet6_dccp_int(r3, 0x21, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 977.463826][ T2123] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:33 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6c000000) 09:07:34 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x68000000) 09:07:34 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 977.831033][ T2143] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 977.849593][ T2144] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:34 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x331, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000040)=[{{}, 0xfffffffffffffffd, 0x38, 0x400000002}], 0xffffffffffffff63) iopl(0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x111240) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c000}, 0x1) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0x7ff, 0x4) 09:07:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000340)="6a508d39239b33e99c903fc3f0eb2711c23fef0bf8c75a8af0e08fa33b5bd4b35faedc0212189dd9a8cbb8bdb101cc8cbc970e1ca87ae3df489efc61ef6638031c171405d643aba0f12976cbe88e1e74b251a8f4dccb3b8922e351f7c420b68fa29afcabeda0c460552c7aebf9a68696b2fe3af1063a36bc7f8ebe1101544da2bd392bef7abdc82cf89abd243ad41ecd7526", 0x92, 0xfffffffffffffffc) keyctl$invalidate(0x15, r2) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffe, 0x4040) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x4, 0x9, 0x1, 0xfffffffffffffffb, 0x2, 0x400, 0x7fffffff}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x20010, r0, 0x0) close(r1) 09:07:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x74000000) [ 978.209796][ T2162] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:34 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x80000000002, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="0000ea", @ANYRES16=r2, @ANYBLOB="000b2abd7000ffdbdf2505000000240002000800030004000000080004000700000008000500fdffffff08000900090000000800050003000000080006000600000008000500040000000800060000000000080004000300000008000500400000003400010008000800040000000800080004000000140003007f0000010000000000000000000000000c0006006c626c63000000000800060002000000"], 0xa4}}, 0x4) bind$ax25(r0, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x2}, 0x1}, [@null, @null, @netrom, @netrom, @bcast, @remote, @default, @rose]}, 0x48) 09:07:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000140)={0x40000001, 0x9, 0x1c}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty=0x400000000000000}}, 0x0, 0x10, 0x0, 0x4001000, 0x34}, 0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="66000000c256862b764a45e89a30e70f34983f9b98147649d849443894080105257da4588fef603a5d9350a3fc2c923a6c35651a84b62c591e86cd6573a242af9bc4fe5485b5872cb8807d9e41c6545cf301d8602bc8aff1f51f64eae2bc442b62002bfb6409dc18d3075c49867e9dd335ba68148c4f7e91c6339f85e4ec6bef0901942884c8326d562aaa43137dd60add3e727d7af39444283910d260b4c4933f44402f841bd6915832874385b5181e22713b1c00a76bf1c03d8e5615892ac51fdec691dc232c2fc53e62428727c8a84034a506cd755a491ba914178bf12d7638b03bd51aefaa823af19e02c37edddde368192e02b3810b8cc30f02b39805095c9fcb48a8bdedd96f337e08e780624742001803061e364d66ad0463e6592eb77ee327a0fc7cd9f2713d11ba0a92e73e3479a03f"], &(0x7f0000000080)=0x6e) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r2}, 0x8) 09:07:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7a000000) 09:07:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000000000068d5"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 09:07:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="6f51a34f2bf3129041185c33f901000000", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 978.498614][ T2178] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:35 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:35 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x332, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101200, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x200100, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x1, 0x2) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, r1, 0x10a, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 09:07:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x9effffff) 09:07:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) socket(0x10, 0x2, 0x0) 09:07:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf0ffffff) 09:07:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xfffff000) 09:07:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) socket(0x10, 0x2, 0x0) 09:07:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="6f51a34f2bf3129041185c33f901000000", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xffffff7f) 09:07:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:36 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x333, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xffffff9e) 09:07:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) socket(0x10, 0x2, 0x0) 09:07:36 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x5dc, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r4 = dup(r3) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getpeername$llc(r3, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r5, 0xc1105518, &(0x7f00000001c0)={{0x9, 0x0, 0x1, 0x8000, 'syz1\x00', 0x7fc3}, 0x3, 0x20000000, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x2, 0x0, 0x8]}) read(r2, &(0x7f0000001900)=""/4096, 0xfffffffffffffd9e) ftruncate(r5, 0x8007d) sendfile(r4, r5, 0x0, 0x2008000fffffffd) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32], &(0x7f0000000100)=0x1) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x5d8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x50) 09:07:36 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xfffffff0) [ 979.974131][ T26] audit: type=1804 audit(1553245656.329:78): pid=2262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir737883372/syzkaller.HyqA4s/1033/file0" dev="sda1" ino=17431 res=1 09:07:36 executing program 1: 09:07:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x40030000000000) [ 980.071592][ T26] audit: type=1804 audit(1553245656.369:79): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir737883372/syzkaller.HyqA4s/1033/file0" dev="sda1" ino=17431 res=1 [ 980.186725][ T2279] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="6f51a34f2bf3129041185c33f901000000", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$inet6(r0, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x6d9b, 0x7, 0xfffffffffffffb10, 0xffffffffffffffff, 0x8}, &(0x7f0000000580)=0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440)={r2, 0x84b}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000004c0)={r3, 0x8}, &(0x7f0000000500)=0x8) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r5, 0xfffe, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000700)={r4, 0x1, 0x7}, &(0x7f0000000740)=0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000005c0)=0xfb) r6 = dup(r0) ioctl$PPPIOCGFLAGS1(r6, 0x8004745a, &(0x7f0000000380)) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000000780)=ANY=[@ANYBLOB="0400000000000000000000008d000000000000006a16ed149e0000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000c800000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000a5bc9018c13cbf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="000000000000000002300000000000002b00000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="000002ffe10000000000000000000000000033c60f47bcb000000000000000000000000000000000000000"], @ANYBLOB="000000000000000004000000000000005400000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) getsockopt$ARPT_SO_GET_INFO(r6, 0x0, 0x60, 0x0, &(0x7f00000001c0)) pipe(&(0x7f00000006c0)) recvfrom$inet(r6, &(0x7f0000000600)=""/41, 0x29, 0x2, 0x0, 0x0) 09:07:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf0ffffffffffff) 09:07:37 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x334, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x100000000000000) 09:07:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:37 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 980.925712][ T2316] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x200000000000000) 09:07:37 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 981.137916][ T2329] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="6f51a34f2bf3129041185c33f901000000", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x300000000000000) 09:07:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 981.418317][ T2345] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:38 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x335, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:38 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x400000000000000) 09:07:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x500000000000000) 09:07:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:38 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:38 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x600000000000000) 09:07:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 982.337597][ T2391] validate_nla: 2 callbacks suppressed [ 982.337606][ T2391] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:38 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x336, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x700000000000000) 09:07:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 982.643260][ T2405] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x800000000000000) 09:07:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:39 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 982.847513][ T2412] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 982.885029][ T2412] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xa00000000000000) [ 983.040154][ T2427] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) getpeername$llc(r3, 0x0, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:39 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x337, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xe00000000000000) 09:07:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:39 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 983.576529][ T2452] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf00000000000000) 09:07:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:40 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 983.890315][ T2476] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:40 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x338, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:40 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x1000000000000000) 09:07:40 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 984.463924][ T2496] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x2000000000000000) 09:07:40 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x2901000000000000) 09:07:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 984.624930][ T2512] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 984.762774][ T2520] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:41 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x339, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x3f00000000000000) 09:07:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:41 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4000000000000000) 09:07:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4800000000000000) 09:07:42 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:42 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x33a, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x4c00000000000000) 09:07:42 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:42 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6000000000000000) 09:07:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6800000000000000) 09:07:43 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:43 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x33b, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x6c00000000000000) 09:07:43 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7400000000000000) 09:07:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x7a00000000000000) [ 987.443091][ T2679] validate_nla: 8 callbacks suppressed [ 987.443102][ T2679] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:44 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x33c, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x9effffff00000000) 09:07:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:44 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 988.083455][ T2694] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xf0ffffff00000000) 09:07:44 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 988.286682][ T2715] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xffffff7f00000000) 09:07:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 988.668617][ T2734] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:47 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x33d, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0xfffffffffffff000) 09:07:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:47 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:47 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) r2 = dup2(r1, r0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x7, 0x7fff, 0x8000, 0xb8}, {0x5, 0xe0, 0x3, 0x10001}, {0x4, 0x1, 0xfa, 0xff}, {0x81, 0x5, 0x2, 0x40}, {0x80000001, 0xb11, 0x6, 0x7}, {0xc12, 0x6, 0x4, 0x5}, {0x101, 0x0, 0x5, 0x1}, {0x64, 0x3, 0x5, 0x200}, {0xfffffffffffffffa, 0x8000}]}) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 991.251612][ T2761] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8500, 0x0) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r2}) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000080)=""/20) 09:07:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) close(r2) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 991.461922][ T2780] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 991.601431][ T2780] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:48 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) r1 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r1, 0x0, 0x400000000000018, &(0x7f0000000280), 0x3) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x2800810c0045005, &(0x7f0000000040)=0x618) 09:07:48 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x33e, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x90001, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000080)=0x60, 0x4) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x668200, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x6, 0x4000) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000700)={r3, 0x1, 0x6, @broadcast}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x8, 0x20, 0x401, 0x14}, {0x40, 0xb02, 0x3, 0xfffffffffffffffa}, {0x80, 0x401, 0x80}, {0x1, 0x101, 0x7fffffff, 0xffffffff}, {0x3, 0x40, 0x75, 0x400}, {0x9, 0x7, 0x8000, 0x4}, {0x5, 0x20, 0xfffffffffffffffa, 0x6}]}, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) inotify_add_watch(r4, 0x0, 0x10000000) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000002c0)={0x0, 0x0, {0x0, 0x2, 0x0, 0xf, 0x3, 0xfffffffffffffffd, 0x2, 0x5b, 0xffffffffffffffff}}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, 0x0, &(0x7f0000000600)) r6 = socket(0x0, 0x0, 0x2) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, &(0x7f0000000380)) getpeername$llc(r6, &(0x7f0000000200), &(0x7f0000000240)=0x10) statx(r4, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x20, &(0x7f00000003c0)) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000100)={0x0, [0x0, 0x500000000000000]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r4, 0x402c5639, &(0x7f0000000000)={0x1, 0x6, 0x80}) dup2(r0, r5) 09:07:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:48 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 992.056733][ T2801] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xb) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={r0}) sched_setaffinity(0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000240)={0x8001, 0x2, 0x0, [{0x60d, 0xfa, 0x2, 0x1, 0x20, 0xfffffffffffffff8, 0x2}, {0x7, 0x1, 0x10001, 0x2, 0xffffffffffffff84, 0x1, 0x7}]}) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000200)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x300000000000000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) 09:07:48 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x600, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000300)={0x0, 0x0, 0x2080, {0x0, 0xffffffffffffffff}, [], "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", "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"}) umount2(&(0x7f0000000000)='./file0\x00', 0x1) 09:07:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0xa00, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000080)={0x8001, 0x6, 0x100000000}) syz_emit_ethernet(0x12f, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 992.649904][ T2846] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 992.746206][ T2846] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:49 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x33f, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8000) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x32, &(0x7f0000000240)=0x1000004, 0x4) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) getgroups(0x7, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0x0, 0x0, 0xee01, 0x0]) mount$9p_virtio(&(0x7f0000000000)='!cgroupcpuset%\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x4, &(0x7f0000000380)={'trans=virtio,', {[{@access_user='access=user'}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@loose='loose'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@subj_user={'subj_user', 0x3d, 'lo(\'prockeyring[eth1'}}]}}) 09:07:49 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 993.048774][ T2878] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x4, 0xc) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:49 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0xffff0000, 0x2, 0x100000001, 0x80000001}) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 993.734394][ T2899] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 993.834897][ T2901] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:50 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x340, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, 0x0, &(0x7f00000002c0)) 09:07:50 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:50 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffffffffffffffe6, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) r2 = dup2(r0, r1) sendto$netrom(r2, &(0x7f0000000740)="5d4fdaae9e0399ac9eb9d5617909f37fee5d4ea5d1803c59f6d5d806794466212b67c6464356c0cf0e38ef6f7c7805c58594cc06d86a4694102d44d5fb714e760f8ae7c829df924fd01f8e3555eb93bb59aa75e7fd342bcdd179a4f140ab166e205aea402203763be48b6c2227b3127774d2484f63568a950cb488838ca5b20410127d9a46e6698cfe13176d66ab1edea632cde04a93e745dd8bf737d8b1cc65d78fb29d13bc681b7b13f5b7766cc6bf715c6937b5f2b5358ba546328c5ba51ca0f072a80fd48f415d73620cd8c753a88e6b4029113cca1c5887e3", 0xdb, 0x1, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x16, 0x9, &(0x7f0000000640)=[{&(0x7f00000000c0)="218453be622693bef5659c6c8999d2b3a0f01553c9d2504f02798d34b3ff503e90398253fcfd45185bb5418019f32f8dd400772b3295ef20f1e37d3a5a", 0x3d}, {&(0x7f00000001c0)="84dfef6f55fc3b8005e0257835fd3d70be751414831bd63670a988265737e6300cfab98043b7d1fba91a8820f406f9e5fddcbe47c1f8b30096b545f70dbabf34efc2df376f4060f6c5beb27a888aa76b5d2efbf6459d7a074dc97f3afb0faaecece72900890ba3", 0x67, 0x6}, {&(0x7f0000000240)="7eb14d281ee692534ecbb22c24bb7b8cd06b7631750e3ea844351157ecf94907747da40885604f6d40ee0f1d327fc0f7d2a4fbc9c033d35bb45b7d26f9e20e48eb4cc9ff53c69b69fac69a9e7f7750f65aefb7ba922d3984fb879a96fd5f8dfedc5178da70edcb18e2f7d4c3a62d56ddf8f5c3e9577edb8803c0f48954a3a78c7d5b3da867637ddd94f5ef1fe8451db25aff9772c832496c54364f76d69adf9c390d98bb7bbb47576976527e5e22509790bec7900a2e028e36ba2088d9fc710baa00ff981326609bd18f14383c5468986ffa2e", 0xd3, 0x4}, {&(0x7f0000000340)="90e9825e180bfb27ea99194b833ad61c4beee908e558df48a49a8838164419db9a1dcce25bb3bbbf0d985d13ffca96a38be84584552df0e4e3e4f4a9e7484065d51a0c59e41fd3240aea54673d0ac6eeb661ad2a6cf6655518e3f8", 0x5b, 0x4}, {&(0x7f00000003c0)="2c92e5df2859c69958fc72787797634fc72afbb873b4b86d7e6221363a41c6c586cb7250e4bd7874879e0603fc77619f8517c9367ed6c47cedb2705084b1acead5", 0x41, 0x4}, {&(0x7f0000000440)="03fdd3d06967c6b5f39c0b70b07f7e43fa2d3d17911b602bcd45428214e0d242fe631982e80b9ee9b4f81f325a9b332c7a7020e4c4f3102531ff1365ea599017e00ca88fc3e9ba70c66935f35fa7fe45b06edca21ceb8344c61054e0c4a18f1d4f26b21f7e4b9d0dad7a8627727f07d9096f48bfbadcfd70661e0523c99ebdb8ae0b53ed7b8a852243231941e3c8bac719a1cbd0c640be13083a8a4f13eec0a12bb5a29a48d61b1b111913a454c3e6ea22c4a79d008bac69db36b41462c38313d93ebde45f3e46867b27a190cc1540f099e108154a7833859d52fe796ac1dcd65410b66f02ec6dea81015843", 0xec, 0x2}, {&(0x7f0000000540)="4a380ece4e98ce1f3eb322df4adc3c1fb03e93cfdf6996e631202fd0e320d658882be68dc09802e5f6bd797fd10a969738dd2cb9dfa31e3b9d72cb9b657037e8140a82a29b4841", 0x47, 0x5}, {&(0x7f0000000100)="458802db98b6b65387dc0b5bad43e895bb95ab50b7730e136d", 0x19, 0x100000000}, {&(0x7f00000005c0)="70970b0b6c89e3c2aedf5b14584f98930756cec274a78d16c0350b3b829450c6b2350d5b5c92b7b596e1912ec7e7b19a89a79b125e1eb52fc442e360cdee793c9c5fda78fb6771d2fa49411d", 0x4c, 0xfff}], 0x100080, 0x0) 09:07:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x101, 0x7, [0x6, 0x3f, 0x9, 0x4bd8, 0x6, 0x4, 0xffff]}, &(0x7f0000000140)=0x16) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x800}, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(r2, 0x400454e2, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r2]) 09:07:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:50 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @loopback}}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4040, 0x0) connect$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) connect$pptp(r0, &(0x7f000004d000)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @remote}}, 0x1e) 09:07:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x600) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x20}}, 0x4, 0xfffffffffffff801}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r1, 0xe, 0x3}, 0xc) syz_emit_ethernet(0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000001c0)=0x100000000, 0x4) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700ff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x3, 0x0, [{0x480}]}) [ 994.624169][ T2943] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x200, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 994.690689][ T2946] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:51 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x341, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:51 executing program 1: geteuid() r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000000)=""/135) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x1, 0x1, 0x10000, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x4000, 0x0) rt_sigaction(0x22, &(0x7f0000000280)={&(0x7f0000000180)="c4411573d2b52e45dd8c6b44000000660f3808d9c4c1d5c69f0a0000000ac441f97f851adb0000360fe9dac4a17b708cdf0200000047c461c855a20f000000c4e13ac27dfe8440e100", {}, 0x80000000, &(0x7f0000000200)="42020bc4c119d14600c421b7517f00f3400f5a44c40ff0468193689afedf99899999f00fc023c481cde88eff7f000066460f38038d32233333c441b9f21508000000c44179e784f080f7f936"}, 0x0, 0x8, &(0x7f00000002c0)) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000340)={0x5, &(0x7f0000000300)=[{0x14af, 0x0, 0x20, 0x3}, {0xffffffffffffff10, 0x101, 0x100000001, 0x2}, {0x1f, 0x1, 0x7fff, 0x13c}, {0x6, 0x5, 0xeb0, 0x7ff}, {0x8000, 0x3b, 0x6, 0x3}]}) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x88000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000003c0)={0xf006, 0x111000}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000400)) write$binfmt_elf32(r3, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x1, 0x400, 0x8, 0x50c6, 0x2, 0x3, 0x3, 0x1ce, 0x38, 0xf9, 0x10001, 0x6, 0x20, 0x1, 0xffffffffffff1041, 0x2}, [{0x2, 0x5, 0x6, 0x4, 0x7ff, 0x6, 0x80, 0x7}], "0ab605fe8a83408758d23dee7f4ac9975752c9ea66bff4a23082bf721172000d6493ba55e021ae295e09c84a95974716f6d7734fe4c57ba0d04bb199dcbad671c15e41595677c4e83fd632443148fca20bd1780a0e3c2de2fada622200fcc22027713500cafe4201882ada94bfd33b308623065aa4b9221d7b8412f0bd7d8cbe24ce86cfb0e32e", [[], [], [], [], []]}, 0x5df) delete_module(&(0x7f0000000a40)='/proc/capi/capi20\x00', 0x200) socket$kcm(0x29, 0x5, 0x0) geteuid() setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000a80)=0x8, 0x4) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000ac0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5, 0x4, 0x3, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}) write$vnet(r1, &(0x7f0000000c00)={0x1, {&(0x7f0000000b40)=""/37, 0x25, &(0x7f0000000b80)=""/96, 0x3, 0x3}}, 0x68) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000c80)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000d00)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000d40)={@multicast2, @loopback, 0x0}, &(0x7f0000000d80)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000dc0)={'bcsf0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000f40)={@mcast2, 0x0}, &(0x7f0000000f80)=0x14) accept$packet(r0, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001000)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002380)={'ip_vti0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002480)={'nr0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@ipv4={[], [], @initdev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000025c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002600)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000002740)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002b00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x1000020}, 0xc, &(0x7f0000002ac0)={&(0x7f0000002780)={0x304, r4, 0x100, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0xec, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}]}}, {{0x8, 0x1, r8}, {0x7c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r10}, {0xb4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8, 0x7, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xc000000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}]}}]}, 0x304}}, 0x40) 09:07:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, 0x0, &(0x7f00000002c0)) 09:07:51 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:51 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000040)=""/39) 09:07:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:51 executing program 1: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x3, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x105840, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x40, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x2, 0x2) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000300)) 09:07:51 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @broadcast}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00\xf1|9\xd7\x96\xe5c\xd2\x1d\n+\a\x99\x19b\xb7\xf6D\x8dQ\x96\xe4\x0fb~:\xcd\xe8\xd6\x89\xb0\x1f\'\xbd\xf1\xbb\r\x05\xc7x\x14\x87i\xa3 wS.\xcb\xf8\x9fzf\xe1+\x9b\b\xf9\x9a<\xc9s\x88\xcdD\xad\xbc;V\xae\xcd}\x04%\xe7\xa6\fF\xe73\x83\xf1GL\xc0\x80') connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @local, 0x9}, 0x1c) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getpeername$inet6(r1, &(0x7f0000000140), &(0x7f0000000240)=0x1c) [ 995.066167][ T2971] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 995.102754][ T2971] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000001300)=0x10, 0x800) bind$inet(r0, &(0x7f0000001340)={0x2, 0x4e24, @rand_addr=0x80000001}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001380)='/dev/dsp\x00', 0x2000, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f00000013c0)={0x80000000, 0x9, @value=0x1}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14, 0x11, 0x2, {0x0, 0x3, 0x3}}, 0x14) r3 = socket$inet(0x10, 0x3, 0xc) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000001400), 0x4) socket$kcm(0x29, 0x2, 0x0) accept4$nfc_llcp(r2, &(0x7f0000001200), &(0x7f0000001280)=0x60, 0x800) lsetxattr$trusted_overlay_upper(&(0x7f00000012c0)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x84, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:51 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 995.360534][ T2987] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x4000c0) 09:07:52 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x342, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:52 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x400400, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0x80000000000001}) 09:07:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000540)="bbe18b0fd33569ac070c7a9e2962e493835372e817233ff06f4abf774e5783a15613e8a8dccd0425d16c88cd4f0e2e8da107c488c742d242d54eca75249a4a5a2791cce2de63c145565c74a8ce61dc16542da23d31a2a50126447d6a8fe541b23a144951ffffff7f80fcca80ff5ef8e4ae34d3cd2d5ad806c0ef2bb4ffffffffbdeddba03a55e20b4048", 0x0}, 0x18) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = gettid() write$FUSE_BMAP(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x100, 0x0, 0xffffffff, 0xffffffff7fffffff, 0x0, 0x3, 0x20088, 0x0, 0x24e8, 0x6, 0x1, 0x1f, 0x0, 0x8c2, 0x1, 0x8, 0x0, 0x4, 0x9b5f, 0x3b9a6b16, 0x2, 0x82, 0x6, 0x0, 0x8, 0x2, 0xffffffffffff8de2, 0x3, 0x800, 0xfffffffffffffff9, 0x2, 0x10001, 0x0, 0x9, 0x9, 0x0, 0x0, 0x72f, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x4, 0x6, 0x5, 0x0, 0x5, 0x614d}, r3, 0xc, 0xffffffffffffff9c, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000003c0)={0x0, 0x70, 0x7fffffff, 0xfff, 0xeb21, 0x0, 0x0, 0x0, 0x4020, 0xb, 0x100, 0x0, 0x0, 0x81, 0x3, 0x3, 0x8, 0xffffffff, 0x8, 0xd41e, 0x100, 0x3, 0x8, 0x2, 0x0, 0x0, 0x1ff, 0x1, 0xfff, 0x2, 0x0, 0x3, 0x40, 0x8, 0x3, 0x1000, 0x9, 0x6, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x4}, 0x4001, 0x20, 0x0, 0x6, 0x1, 0x0, 0x2a0a}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="cdba7f87f1090000000000000000679d659a533e5ca0e33724bd23e8df28784317d7ed462388f8e0fc8bc10e4b0529475c7dd70258ae69a2dab601716b96517eaaa1146e027ff60826e6d70100b7c144f1ae17149a80c7bb1a55da4c19eb83c80c7eedd0d26c950bec6a42789b3f9e18de373c82324301d63e0100000000000000ee91934ca24968200ee299d4a6f2021463fc44d2b32f924f4f8d584e47b881142cc2a34588ad0b2b9d000000000000000863f9d5d8c58e977d06313de03e94f1d76e6c315a96a332bfda50a5e65d4919e159428ab1e5ca0d17a51ccfb0caa56dfdcfcdd0d53c02f0a24aa965ade8"], 0xef) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETLINK(r4, 0x400454cd, 0x110) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, 0x0, &(0x7f00000002c0)) 09:07:52 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unlink(&(0x7f0000000280)='./file0\x00') r2 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x4) r3 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYRES64=r0, @ANYBLOB="73b405d08889fb97dcedd127eb776e03bae72bcec547829cd2d4f0a4a3c8c9159a0fcb09855fdc6c5c79e02a98f7ddadb144137ef7edea27652ffea88789ec4e04911191704a1825788a0e2e78af6a8c799e35526a73d625566453be64dd444398ad4656d750b52c5c3c4e2b00f0d97736d9cb31e3afc6fb06d8d52a67dd14bf972219022df84e8f7f553729f0fca74c86c4894330c220297437e8394b658f3968d29855c114ec4e5b82ca7b722676f4a769906cf161f4c171121b9371f47ef8ebf13a6456", @ANYRES32=r1, @ANYRESDEC=r2], 0xa6, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b48931f6ff6d"}) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) r4 = accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) shutdown(0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000018000000000000000800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a627300000000", @ANYRES64=0x0, @ANYBLOB="0001000000000000"], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x0, 0x30, 0x0, 0xf0}, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000007c0)={0xffffffffffffffff, 0x9}) r5 = getuid() ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000540)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r5}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000002e80)=0x0) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000002fc0)=[{&(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000800)="0cef472389859a5f92df2bb14cca6fc8d75c54c5be66dbedb5d02b582e20855ce47f0fdd90c6b073d10361dc3424347eb3c8ae8977347bd8c6f308d1576dfa9ee9f20c2fa0df60b6cc50a7199750421b665aac3a95bc4476805c9bea4ccd309d86563332f99aefb3b0589c4b9d4a5cc2f2e413c2ea3b7f47b2a594ba5083ce7e1b5eca2f9c8018614246006f2547da5cfcbc079b41787f453ca24413bb0574066d05dec0ba2c61228a0471e227f2ec4e694379a9e80006022922e4557ea3e8d7489226fd940826f207d6ee56267949d4ce1f8f48690083dc7daaa12415464057def8da1c348980e2e0b00ba73a0c134734340f", 0xf3}, {&(0x7f0000000680)="49edabc7a6188ffc307748d1161c5ccef0c080f00d0c1f3a60", 0x19}, {&(0x7f0000000900)="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", 0x1000}], 0x3, &(0x7f0000000780), 0x0, 0x421b7d6ef2e59532}, {&(0x7f0000001900)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001980)="4aef332e4a239c96342a6723fa0ca0fab7aff8a48f45c4e55b24dd88443f3b82be88a60c0680cffa5c124897f1e69b1f286aca4ac9b771b48e463832bb2c6d06c6ee553087012f7bb3a0a5881366e087f08985670978f8803f6130fabd1a7fde9c687097cb8d2a1069534ea190e09105f1a6abc0c9558f2cb0e186aae1a7e4023ae32177b7eca65082194cedadca", 0x8e}], 0x1, 0x0, 0x0, 0x4000000}, {&(0x7f0000001a80)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001b00)="6c64c59e1128aa5c4e330088a1641613bbb55f35559d2b2379aab33c958e6c176359bf81df7a62f31edbdd", 0x2b}, {&(0x7f0000001b40)="d7d0ff6d18dc0f506e8a972dc2b7f8e66260841b1251a1fce0d78f3f650aed77535b249427fbabeb6eddf102b62aab16205bd4a1875687c7c37078cb56e98380f158b06c6ce0fe97eeebd3bb0bef43dbb112c3c1a81ab0522dbc5472104277aa7c22984796f1b173f8d77c16e9ca5c602fe8118db4", 0x75}], 0x2, 0x0, 0x0, 0x8004}, {&(0x7f0000001c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002e40)=[{&(0x7f0000001c80)="33c796dca41f6429918dc93baa37587bae09a75f64070172db54e543cc6fd1ffeb2d523015c997d5597fa9c9da9179f5ab21483c466141f6af4efef896a6ec5adc88e01c05154a4948beb98e9581cc76b0caab55be193ada5ad6352e4c95ce53935060243d6fa2fa18f7a89f61d70f4f5efb4fad1ece2886f2bc9862ec347e6c9d0dba24b6ab", 0x86}, {&(0x7f0000001d40)="d6fd0d269e5c02ea2ecb4c65d1ddd2163a68cde4e9de31d583d8257cd12446d91fcc4920267d21af92f2dcd3b89a424b3962d8601619bae4c19ca72f42169a96b4ba30403f313b8cd9d1f28382d0", 0x4e}, {&(0x7f0000001dc0)="4aabb45b538db471e87b819d692a5aa295869230d281897a85e391c358d5f28aaaf0132cb5407a4915d2e9cc47c901c205579117ad01aa2dd436d75cce5dcd20d28d20055c3504f248e3e2228fa87f", 0x4f}, {&(0x7f0000001e40)="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", 0x1000}], 0x4, &(0x7f0000002f80)=[@cred={0x20, 0x1, 0x2, r7, r5, r8}, @rights={0x20, 0x1, 0x1, [r6, r2, r6]}], 0x40, 0x1}], 0x4, 0x40000) getpid() ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000480)) fallocate(r1, 0x0, 0x4, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, 0x0, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000080)=@req={0xac, 0x5, 0x0, 0xffffffffffff7751}, 0x10) add_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 09:07:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000140)={r4, 0x8, 0x30}, &(0x7f0000000180)=0xc) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe) bind$bt_l2cap(r2, &(0x7f0000000040), 0xe) listen(r2, 0x0) 09:07:52 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x402, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x5, 0x114000}) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:52 executing program 1: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8910, 0x400200) openat$audio(0xffffffffffffff9c, 0x0, 0x80000, 0x0) timer_create(0xffffffffffffffff, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) 09:07:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x4007ff) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r1, 0x5) bind$rds(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0xff1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x4000800000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmsg$alg(0xffffffffffffffff, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:53 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x343, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x0) 09:07:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:54 executing program 2: mkdir(0x0, 0x2) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x0) 09:07:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x1, &(0x7f0000000040)) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:54 executing program 1: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:54 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x344, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) capset(0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 997.998622][ T3130] validate_nla: 5 callbacks suppressed [ 997.998632][ T3130] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 998.096590][ T3134] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:54 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5000000000000, 0x40400) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000080)=0x1, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x7, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) tkill(0x0, 0x32) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:55 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) 09:07:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x0) 09:07:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 998.761594][ T3167] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:55 executing program 2: mkdir(0x0, 0x2) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:55 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x345, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) [ 998.906263][ T3167] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:55 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x3, 0x101003) ioctl$TIOCEXCL(r0, 0x540c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 09:07:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 999.242676][ T3210] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:55 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x6, 0x1) semctl$GETNCNT(r1, 0x4, 0xe, &(0x7f00000022c0)=""/4096) semtimedop(r1, &(0x7f0000000800)=[{0x3, 0x0, 0x1000}, {0x3, 0x0, 0x800}, {0x0, 0x3}], 0x3, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'L-', 0x3d}, 0x28, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002100)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000280)=""/113, 0x71}, {&(0x7f00000003c0)=""/144, 0x90}], 0x3, &(0x7f00000004c0)=""/26, 0x1a}, 0x20000000000}, {{&(0x7f0000000580)=@alg, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/254, 0xfe}, {&(0x7f0000000940)=""/205, 0xcd}, {&(0x7f0000000740)=""/142, 0x8e}, {&(0x7f0000000640)=""/44, 0x2c}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000b00)=""/197, 0xc5}, {&(0x7f0000000c00)=""/119, 0x77}], 0x7}, 0x4}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000d00)=""/81, 0x51}, {&(0x7f0000000680)=""/50, 0x32}, {&(0x7f0000000d80)=""/154, 0x9a}, {&(0x7f0000000e40)=""/62, 0x3e}, {&(0x7f0000000e80)=""/131, 0x83}], 0x5, &(0x7f0000000fc0)=""/125, 0x7d}, 0x3}, {{&(0x7f0000001040)=@generic, 0x80, &(0x7f0000001640)=[{&(0x7f00000010c0)=""/239, 0xef}, {&(0x7f00000011c0)=""/213, 0xd5}, {&(0x7f00000012c0)=""/14, 0xe}, {&(0x7f0000001300)=""/233, 0xe9}, {&(0x7f0000001400)=""/127, 0x7f}, {&(0x7f0000001480)=""/191, 0xbf}, {&(0x7f0000001540)=""/69, 0x45}, {&(0x7f00000015c0)=""/82, 0x52}], 0x8, &(0x7f00000016c0)=""/224, 0xe0}, 0xffffffff80000001}, {{&(0x7f00000017c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001840)=""/249, 0xf9}, {&(0x7f0000001940)=""/131, 0x83}, {&(0x7f0000001a00)=""/127, 0x7f}, {&(0x7f0000001a80)=""/238, 0xee}, {&(0x7f0000001bc0)=""/49, 0x31}], 0x5, &(0x7f0000001c80)}, 0x1}], 0x5, 0x40000000, &(0x7f0000002280)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000500)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa", 0x5a, 0x10000}], 0x5, 0x0) fdatasync(r0) [ 999.336993][ T3210] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:55 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}]}, 0xfffffffffffffffd) r2 = getuid() r3 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) getresgid(&(0x7f0000000100)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000940)=@nat={'nat\x00', 0x19, 0x4, 0x6f8, [0x20000240, 0x0, 0x0, 0x20000660, 0x20000690], 0x0, &(0x7f0000000040), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0xf, 0x14, 0x88fb, 'gre0\x00', 'dummy0\x00', 'nlmon0\x00', 'veth1_to_hsr\x00', @empty, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @remote, [0xff, 0x0, 0xff], 0xa8, 0xe0, 0x158, [@cluster={'cluster\x00', 0x10, {{0x7, 0x2, 0x0, 0x1}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffe}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x80000001, 0x3, 0x3, 0x0, 0x0, "6dcc0144b434705d54f85bf833a09c6bbee12e70d665cc4788717ac80054b4d2904555b8757e889711b4e0ff71b1cdd851645817fc5f4c3c6453498db006a185"}}}}, {{{0x9, 0x4, 0x0, 'sit0\x00', 'ip6tnl0\x00', 'caif0\x00', 'syz_tun\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x11}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x100, 0x268, 0x298, [@owner={'owner\x00', 0x18, {{r2, r3, r4, r5, 0x4, 0x5}}}, @nfacct={'nfacct\x00', 0x28, {{'syz1\x00', 0x3}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:apt_var_lib_t:s0\x00'}}}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xffffffffffffffff}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1c0000000000000}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x17, 0xe, 0x890d, 'ifb0\x00', 'sit0\x00', 'veth1\x00', 'bridge_slave_1\x00', @random="a1e410933178", [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], @dev={[], 0xc}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xe0, 0xe0, 0x118, [@pkttype={'pkttype\x00', 0x8, {{0x7, 0x1}}}, @connbytes={'connbytes\x00', 0x18, {{0x6, 0x5d14, 0x1}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}, {{{0x1b, 0x9, 0x887e, 'hsr0\x00', 'lapb0\x00', 'lapb0\x00', 'netdevsim0\x00', @link_local, [0x0, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0xc0, 0xf8, 0x130, [@helper={'helper\x00', 0x28, {{0x1, 'sane-20000\x00'}}}]}, [@snat={'snat\x00', 0x10, {{@random="b0a50828b681", 0x10}}}]}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff}]}, 0x770) 09:07:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:56 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:56 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x6, 0x1) semctl$GETNCNT(r1, 0x4, 0xe, &(0x7f00000022c0)=""/4096) semtimedop(r1, &(0x7f0000000800)=[{0x3, 0x0, 0x1000}, {0x3, 0x0, 0x800}, {0x0, 0x3}], 0x3, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'L-', 0x3d}, 0x28, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002100)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000280)=""/113, 0x71}, {&(0x7f00000003c0)=""/144, 0x90}], 0x3, &(0x7f00000004c0)=""/26, 0x1a}, 0x20000000000}, {{&(0x7f0000000580)=@alg, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000840)=""/254, 0xfe}, {&(0x7f0000000940)=""/205, 0xcd}, {&(0x7f0000000740)=""/142, 0x8e}, {&(0x7f0000000640)=""/44, 0x2c}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000b00)=""/197, 0xc5}, {&(0x7f0000000c00)=""/119, 0x77}], 0x7}, 0x4}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000d00)=""/81, 0x51}, {&(0x7f0000000680)=""/50, 0x32}, {&(0x7f0000000d80)=""/154, 0x9a}, {&(0x7f0000000e40)=""/62, 0x3e}, {&(0x7f0000000e80)=""/131, 0x83}], 0x5, &(0x7f0000000fc0)=""/125, 0x7d}, 0x3}, {{&(0x7f0000001040)=@generic, 0x80, &(0x7f0000001640)=[{&(0x7f00000010c0)=""/239, 0xef}, {&(0x7f00000011c0)=""/213, 0xd5}, {&(0x7f00000012c0)=""/14, 0xe}, {&(0x7f0000001300)=""/233, 0xe9}, {&(0x7f0000001400)=""/127, 0x7f}, {&(0x7f0000001480)=""/191, 0xbf}, {&(0x7f0000001540)=""/69, 0x45}, {&(0x7f00000015c0)=""/82, 0x52}], 0x8, &(0x7f00000016c0)=""/224, 0xe0}, 0xffffffff80000001}, {{&(0x7f00000017c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001840)=""/249, 0xf9}, {&(0x7f0000001940)=""/131, 0x83}, {&(0x7f0000001a00)=""/127, 0x7f}, {&(0x7f0000001a80)=""/238, 0xee}, {&(0x7f0000001bc0)=""/49, 0x31}], 0x5, &(0x7f0000001c80)}, 0x1}], 0x5, 0x40000000, &(0x7f0000002280)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000500)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa", 0x5a, 0x10000}], 0x5, 0x0) fdatasync(r0) 09:07:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x330, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x346, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) [ 1000.010422][ T3262] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 1000.155186][ T3279] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:56 executing program 2: mkdir(0x0, 0x2) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:56 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:56 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25DELUID(r0, 0x890b, &(0x7f0000000200)={0x3, @rose}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f0000000040)=""/155, &(0x7f0000000100)=0x9b) 09:07:56 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6c0, 0x141400) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000100)=0x6000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f00000001c0)={0x0, 0x0, [0x4, 0x1, 0x9, 0x7]}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0xe7, "a547e1ac49be38914beb92dd8f8a9c2de686878bdea58ccb94ab90c77c1ca4cc0412edefaaa5d383d112656902ac7eb2b5198c7b835a857605e79ccb1cf3a8e8890cfe9022b5fc05cbc3a79767ef102ca6a1ab953715a2225c42cb8e8a10a690b756a7f3cf56b8f5055594cb327011a47c1759d0386ccde812342484b99997caefef11ee878cc48f483f222842c62c2ca3736c7b39cceac4a7d086bf889fc9f0d029afa67fe74526ac8310e0ae0cece8f7805c40d407cd6f15dc1f8121550aef8ab89355e26c5552d18805e86aff5224beaecfcd6dcd510a11b6870e8aab172345901a6ff5ac61"}, &(0x7f0000000340)=0xef) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000380)={r2, 0xa9ac}, &(0x7f00000003c0)=0x8) syz_emit_ethernet(0x0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1000.660544][ T3307] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:57 executing program 2: mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "110893eb985a8e68"}, 0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000200)={0x11, 0x0, 0x100077fffb, 0x0, 0x10, 0x1}, 0x2c) [ 1000.807942][ T3312] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:57 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40000, 0x0) sendmsg$alg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)="452d23444d0be00d1b1372e5eb2b497ee62eaee2066b63863e39a26338023e3c30874f2a5cf447b2c657d2542823f324767615d1858a06ed5010becbd00b0a884ce48d67dacca948eb84569a6ca00c9072123c00b9880d6b55420be2518e2cb0169b73806571295f9fd2d4bc6ebdb8069ad213e1f5fe03a4fb3c8b79091fa91bb64048cd8f3c5559df35ad07a67cdc7a5efcbc16b3bc9cb0ade81c2142f5a046d63040a1aea9f1a006d9c58e1f42ce5802f74b1d1401d7f37cce7db5e0571fd7e2cf", 0xc2}, {&(0x7f0000000080)="7c403c7932465efd0a4bc32678c93f9f3cbcb4f79aa4dbac16ac09617be325cf14e9a840bc39c70b0ac4d727fa554019215443ea48", 0x35}, {&(0x7f0000000480)="a2b050ec002fa6d2ed6addfc95451ed0482ae2e76c6e8b60575adb97eaf5007fdad4bebec9fe7bed1dd1a35253f8fd81bdf7198e031ae61e33ccf7995b244c216d9f09d9e566d2", 0x47}, {&(0x7f00000002c0)="e99fd77ec8d32309f6b427f5229dc272f12997cd14d2fdecf8234fa2c79ce66e93f3e120b16e1c23d741dd178f2532763c4c8e7c7a8ff28fcb6b03d4bf5fa7b41c3077bfe5ff7f2490b8825d3b7578c5615870586304ab489f22f563ab27df623e5c421f32c36552e31165bb51473e614847f9a81b47144723edce2abc2fb87eef4d4d07e983c86954fc", 0x8a}], 0x4, &(0x7f00000003c0)=[@assoc={0x18, 0x117, 0x4, 0x101}], 0xfffffdcf, 0x40}, 0x4000) bind$bt_rfcomm(r0, &(0x7f0000000440)={0x1f, {0x680, 0x0, 0x9, 0xfe, 0x40, 0x5e}, 0x6}, 0xa) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x28, 0x0, "c7865bfafd87f2aa21cd44159740e64e24d76c422e7dd08e059c7db93f1c7bd2"}, &(0x7f0000000500), 0x1000) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:57 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x347, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:57 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x7, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "110893eb985a8e68"}, 0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000200)={0x11, 0x0, 0x100077fffb, 0x0, 0x10, 0x1}, 0x2c) 09:07:57 executing program 2: mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000100)={'veth0_to_hsr\x00', {0x2, 0x4e21, @remote}}) 09:07:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "110893eb985a8e68"}, 0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000200)={0x11, 0x0, 0x100077fffb, 0x0, 0x10, 0x1}, 0x2c) 09:07:58 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "110893eb985a8e68"}, 0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000200)={0x11, 0x0, 0x100077fffb, 0x0, 0x10, 0x1}, 0x2c) 09:07:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r1) syz_emit_ethernet(0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:58 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x348, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:58 executing program 2: mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "110893eb985a8e68"}, 0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:07:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x2, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:58 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="b90000003f3325bd6304f496a21ce1fdff5e8e9a5cae695701f1fef055b7b075bdbfe6412bb20f76aa9a390ea34f4104d9fe934d0729f223be7cb9a41ff88a55af23a93f3c0a7ec2487b9e0e0e86cb5d98ef3c3a20f62d2ee86765ef4067eb155dc123cdbb9363cc9a89596879fb9cfd9314db3a9c244d1fc505a3c000c692c616abc6e857796c26a751637e97b86b04123d8cf0eba853b1ebd44f34dcabb716b3faffbc986b6887fa7a11ea48b3c3ddc2f0085e0954269203a1c83e99"], &(0x7f0000000100)=0xc1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e20, 0xff, @mcast1, 0x200}}, 0x0, 0x1, 0x7, 0x401, 0x401}, &(0x7f0000000380)=0x98) sendmmsg(r0, &(0x7f0000000940)=[{{&(0x7f00000003c0)=@caif=@rfm={0x25, 0x81, "f08d28a7e59439bc70abff788869f055"}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000440)="a90564c668b28b02e586fb576d204c580f89d3011049cc90e5427b428aca5a8178c00775977a236e0bace1e2a38f118b5c199787666a9247e66bacc3624f3d3a2a2e0914507daca8417bddef5f8ad641b81a5f3878740c9c92014151b09204cdd0beee867fa02107f0cee13029686182496af1982eec7b2601a09f81cb164ad9aeafaaef605d537646a35039de7f710120c04f569949249405ad9605cb081786c56c03f93ec22e303cfc5a92704e96d4ddf9cc41e73825e84d099a7739754209723c34c9206e0d07ba250a745c727c7c337bafcf989e33e28d2a87ca518a2f60c5826384", 0xe4}], 0x1, &(0x7f0000000580)=[{0x108, 0x10f, 0xfffffffffffffffd, "a931479220c94edf89e57c8f8e43c49cab12bc8b8cf5793889aa88d25b1f1aabba0e91ab8947cf36fd9ae3b0b88548c76fd9d308c1cf6ff5548d85bf18e398168f266e2c2c27f531bdd9c2428e7b2e01b77d731220aac56da3cfb1b8f8f1591b282d67a3eada5a11987dcfed50df8df12dd71e1fb99fbeac08acdc8abf36530ed597ec19cda74bfa138c5de9cd88590c9f1a14426e2985a4c3e91a1fda25d0a40b479a2c9a7e4aa3748bb89ecdbfd9ed361e117a6605b7f7d248205e33811223c20017d4785e537e5bc26035314f5c66a3107808cf909f6074b1ebdbb80dfb75764f7156105ab55b6b11dec3904e2834492eaacf55"}], 0x108}, 0x4}, {{&(0x7f00000006c0)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)="598937160de9665f63eade1e2a791edb5ae2b57b871271c139465118d75f4c0ad7714a3b4f482c394fe18d742d637342a73a7a70723167b9bd83a23bcc98e81b096e0bdeb8f42690183bae66ebe9741067be2828728aa814b5c219b1a4fadd9b5f80ee96192eecbf", 0x68}, {&(0x7f00000007c0)}, {&(0x7f0000000800)="a8ee17c52fe768ec4a8500284b37a6e541ae13164a2f673d3cb2f7dcf62fecfa59e473a426817fd4b60ff151864c695c154fffad209817d842", 0x39}, {&(0x7f0000000840)="64eb43740e78f34d6f9785860398b83923f9b2630152d0114980b7f6804f215f8becc997b399c7583b3f6583f5913ffff57d022591bbaa2066afcfaa86a059aca4ef5e35926fe883a0c7f4f3e93c4de11bf00af3c2994f279d8216bbd697a309c27b7120acdc6126ca1e4f33d2b469fd6217946d8391188facd5ea941a2be644bb", 0x81}], 0x4}, 0x7}], 0x2, 0x80) mkdir(&(0x7f00000007c0)='./file0\x00', 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x1000000002) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000a00)={0x0, @multicast2, 0x4e21, 0x3, 'dh\x00', 0x20, 0x7, 0x4}, 0x2c) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) sendmsg(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:07:58 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "110893eb985a8e68"}, 0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0x3) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:07:59 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:07:59 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "110893eb985a8e68"}, 0x9, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:07:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x8, 0x10000, 0x4, 0x9, 0x73c5, 0x7}) 09:07:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1003.050500][ T3437] validate_nla: 6 callbacks suppressed [ 1003.050511][ T3437] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:59 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x349, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:07:59 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1003.188512][ T3437] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:07:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:07:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x3, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:07:59 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:07:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x8000f, 0x9) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80200, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x4e24, 0x0, 0x4e21, 0x0, 0xa, 0xa0, 0x0, 0x3f, 0x0, r2}, {0xfffffffffffffffe, 0x7, 0x3, 0x3, 0x10000, 0x7, 0x10001, 0x5}, {0x2, 0x5230, 0x6, 0x2}, 0x200, 0x6e6bba, 0x2, 0x1, 0x2, 0x2}, {{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4d3, 0x3b}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3506, 0x0, 0x0, 0x4, 0xff, 0x9, 0x3}}, 0xe8) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='loeth0(lo\x00', 0xa, 0x2) 09:07:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:00 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:00 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:00 executing program 1: bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1004.030144][ T3486] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:00 executing program 1: bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:00 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x34a, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:00 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1004.437275][ T3521] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x4, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:00 executing program 1: bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:00 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:01 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1cc04f16, 0x0, 0x0) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x9, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x9, 0x1, 0x3, {0x0, 0x989680}, 0xdce1, 0x23f60374}) r2 = socket$inet(0x10, 0x10000000000003, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0), 0x0, 0x0, 0x2fc}, 0x8090) 09:08:01 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:01 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:01 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'vlan0\x00'}}) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1005.116864][ T3541] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:01 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x34b, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:01 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xff36, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000001c0)={0xd, @capture={0x1000, 0x1, {0x100000000, 0x400}, 0x20, 0xfff}}) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:01 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 1005.496098][ T3562] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:02 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:02 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xbb, 0xcc800) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000100)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x1}) readahead(r0, 0x2, 0xffff) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000001c0)={{0x2b, @loopback, 0x4e22, 0x0, 'sed\x00', 0x1, 0x8, 0x7a}, {@remote, 0x4e23, 0x3, 0x2, 0x400, 0x5}}, 0x44) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000080)={0x0, 0x0, 0x100, 0x4, {0x9, 0x4424, 0x100, 0x9e}}) 09:08:02 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1006.082138][ T3587] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1006.097853][ T3587] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:02 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x34c, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:02 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffebe, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x404000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1006.324756][ T3606] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:02 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000049d500000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000170000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000000a00000088de6e723000000000000000000000000000626f6e64300000000000000000000000626f6e645f736c6176655f300000000076657468305f746f5f62726964676500aaaaaaaaaaaaffff00ffff000180c200000f00ffff0000ff000070000000a00000f9ef000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000070000000000000049444c4554494d4552000000000000400000000000000000000000000000000028000000000000000200000073797a31000000000000000000000000000000000000000000000000ffff00000000000054a3f16741dd289f026c965cb82ce65dfb136f351cd285dc81974745d6d968667d99ded8f7967ff6225cea1cc7314a9886287944dd8b0210b8d204e8b8ac0b64f3454145fff4c916b6391c4728d42d234e42c5dc73616a18fa1c6497aab74b180b37946d7de90f68dd673763842d0376e45878c2689d4f55a369efca8d94684060601cbc2a232324f889f84bf6fce1bd5b8634b218576665b1c6088f9bdda65f0a51e6e6e74c8e"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:03 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1eb, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3d, &(0x7f00000001c0)="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", 0x1000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) 09:08:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:03 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1006.877094][ T3624] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:03 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x34d, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:03 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80000) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000080)={0x43, 0x2, 0x3}, 0x10) 09:08:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x8, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = getgid() setgid(r0) r1 = socket$inet(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x40}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x7ff, @mcast2, 0xffffffff}}, [0x2, 0xfff, 0x7, 0x7f, 0x2, 0x8001, 0x8, 0x1000, 0xf22, 0x9, 0xcdc, 0x2, 0x5, 0x153c, 0x2]}, &(0x7f00000000c0)=0x100) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:04 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfe5e, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3c, 0x401) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getpeername$netrom(r1, &(0x7f0000000080)={{}, [@rose, @default, @rose, @null, @bcast, @null, @netrom]}, &(0x7f0000000100)=0x48) sendto$netrom(r1, &(0x7f00000001c0)="68b369f677eb28c2d7238fe19a3fc07c0800c8a4001de7182bb3efd12ae29667f4596aeec0e35167ae5a5afac0e2e59f0ca82b", 0x33, 0x4004, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0x6, 0x4) 09:08:04 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x5, 0x678, [0x20001840, 0x0, 0x0, 0x20001b40, 0x20001d68], 0x0, &(0x7f00000001c0), &(0x7f0000001840)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x8, 0x8863, 'bond_slave_0\x00', 'yam0\x00', 'nlmon0\x00', 'bond_slave_0\x00', @random="120a060e7379", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x158, 0x1e0, 0x210, [@physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'syzkaller0\x00', {0xff}, 0x1d}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x80000001}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz1\x00', 0x2}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x19, 0x8, 0x8917, 'hwsim0\x00', 'nr0\x00', 'ip6erspan0\x00', '\x00', @dev={[], 0x1f}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="596be45e0390", [0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x87a, 'syz0\x00', 0x2b}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x0, 0x9, 0x88bf, 'rose0\x00', 'veth1\x00', 'sit0\x00', 'team_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@random="080363594cdb"}}}}, {{{0x0, 0x4, 0x886b, 'veth0_to_bridge\x00', 'veth0\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x118, 0x118, 0x150, [@realm={'realm\x00', 0x10, {{0x0, 0x100000001}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'bond0\x00', 0x4, 0x3, 0xa, 0xff, 0x8, 0x8000, 0xff}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="2c8d1d15e050", 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x13, 0x41, 0x17, 'tunl0\x00', 'bridge0\x00', 'team0\x00', 'rose0\x00', @random="9c488ef8aaf2", [0xff, 0x0, 0x0, 0xff, 0xff], @random="46dff46fb828", [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa8, 0x120}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0x1, 0x9, 0x1, 0x0, "8e9f5a41915ae4cd6884bec4de103443abd9d823df67e4812442e693bbf4d48dc5d28c8e464c927354faad89da33ee9f3d33876a69e8b36598406b62d8be7aa4"}}}}]}]}, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:04 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x34e, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:04 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xffffffff, 0x202002) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000080)={0x5, 0x6}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xe) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:04 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x227, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000001600)=ANY=[@ANYBLOB="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"]}, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) 09:08:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 1008.613608][ T3730] validate_nla: 7 callbacks suppressed [ 1008.613625][ T3730] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1008.735842][ T3733] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:05 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 09:08:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 09:08:05 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x155f363e, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) timer_create(0x3, &(0x7f0000000080)={0x0, 0x1e, 0x2, @thr={&(0x7f0000000040), &(0x7f00000001c0)="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"}}, &(0x7f00000000c0)=0x0) timer_delete(r1) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 1009.045435][ T3749] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:05 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x34f, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:05 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) 09:08:05 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000001c0)={0x60, 0x4, 0x4, 0x2000020, {}, {0x5, 0x8, 0x8, 0x8, 0x3, 0xe93, "c4462a0c"}, 0x6, 0x0, @offset=0x80000001, 0x4}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) syz_emit_ethernet(0x5a, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaa19ffffffffffff1100470081000000884700000010000000000000001051000000000000000000000000000000ffaafd126711341e48ec5fb4e9e6b934ac805d8a87ccfdeae36ee1f0fd9daf14296bef027c517c7236eb58b06725b26263bb906c158aa951"], &(0x7f0000000100)={0x1, 0x3, [0x4cd, 0x3eb, 0x7ef, 0x17e]}) r1 = socket$inet(0x10, 0x3, 0x9) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000100)}, 0x8000000) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000040)={0x0, 0x0, {0xfff, 0x20, 0xffffffff, 0x8000}}) 09:08:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xa, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:05 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:05 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x3, 0x92, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000080)=""/146}, &(0x7f0000000240)=0x78) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1009.804366][ T3800] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1d0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x100000001, 0x40000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000440)={0x0, @multicast2, @remote}, &(0x7f00000004c0)=0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000500)={@loopback, @dev={0xac, 0x14, 0x14, 0x26}, @remote}, 0xc) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000400)) r3 = socket$inet(0x10, 0x3, 0xc) r4 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10000) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="5c0000000244eda653e89548c18a04b369998cd306952ffe31b459ef741c6b2777a0c484ac7233780757cd9532736caa811f2803feea7cf2fd72d2ec0e9fbc4a4b179e89fa5dbe905304333ec8027b784b1c482fe7039984fd67274e5820d3e4191ff9414a6ea9dba1a67fad793f2836e4633cea46f0dcd113156b070a9bba6927e5221420edd81d7a547f24558be21ee5d9972b39721f84cfc7247b2a57e417589ea8dcb684e0c18c6cf4449e4f440594679942f26877788e7ded42ca291b8fcd0a565baaf83cab7fedfec7ef472fbfef3b83185c690715b7f9dd2e7e4e200cee011e6a5bffc9d19134065e8301b99e"], &(0x7f0000000100)=0x64) accept4$packet(r4, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0xfffffffffffffce3, 0x800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001500)={0x0, 0x0}, &(0x7f0000001540)=0xb) sendmsg$nl_xfrm(r4, &(0x7f0000001700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40c48084}, 0xc, &(0x7f00000016c0)={&(0x7f0000001580)=ANY=[@ANYBLOB="300100fedbdf25fe8000000000000000000000000000aaff0200000000000000000000000000814e2000044e2100ff0a00802000000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="fe880000000000000000000000000101000004d4ff000000ff0200000000000000000000000008010300000000000000030000000000000080000000000000000000000001000000e6d4ffffffffffffff7f000000000000000000004000000004000000000000000600000000000000030000000000000001000000000000000900000000000000010000009f0600000700000029bd7000013500000a000501400000000000000028001700030000002cbd700028bd70002dbd70002cbd700000000000090000000000000001002880080003000d1c0000080016000800000008000300051a0000"], 0x130}, 0x1, 0x0, 0x0, 0x81}, 0x80) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={r5, 0x2c, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x3, @remote, 0x3}, @in={0x2, 0x4e21, @rand_addr=0x9}]}, &(0x7f0000000240)=0x10) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000580)=""/196) times(&(0x7f0000000480)) 09:08:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:06 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x350, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x155f363e, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) timer_create(0x3, &(0x7f0000000080)={0x0, 0x1e, 0x2, @thr={&(0x7f0000000040), &(0x7f00000001c0)="0bbf286a469eeaf87f8d8cd6f9d7b3a77e9bb8c1ba175c97429ce6498dc2250c41295ca48be3aaa99582d036725c2d49eebbe6aaad65176b11dbf3c1236776cbf2ddf7fb550657b974e596d9ba5c9b8885da3212c0ede53eefea0513321c0e2eea55fca630e1b81f7a8b4b2be218d41472f733cb135abec23aa2de31a48289e87dad367c32bf2688bfc4b11d1ea987bd0d688ccf5b5b2342ea535437621b5512625bb06f00ecbdc916995989627968f0f62be63bb19a40a3f21c4ed83dcf19cd6a3547b4e3d210c4b1d1ce9570ecbe54d3818a48690c3bd5d894c46ce1c7f1e4e44cdca6383b1a53b62d190f8b5a28fb826b8133087095344a6ffa331141166bc3209d4fc296ce0d74c4ef18c8ea14ebd906d33a93cc7d4f99972b8cff055e271db2046c2bb18e47bf05730ad86f5c64ccbd315d6d30e4c890aead832644870fdf55b03f159c25fabd798a4d1c1d2758b191e9a0277fa6cee3def1256c7aad6b87bf3063b253c71f6782a1ffcc907e272dca24bc956fdd9ee95075bb7b15611ca800b79396949e6b74a4303d81765a77b21c66320859b4076aa1d83ca05b00075c0c115bfd6ec80ca5be2dabba2fb2497cf2d86f443102f326514cc0c8f79d70231e3ebcb68244725224d71b17be3f17299ee986a10e88c82de1c3049f0d38d809f7dc581c42b032cfb3d959be1ee75f442a5de8c652c50b5aee468ab199369228ea6272d8576b05c9bbbaff41ae0e58aee8af55d026cbe08043ef8ac5987d3672dc47763f4af6f1eb140208c0c58a7462f0f4adfbc143c701dc0ee1797dc6c11abd7e23786665614da8972698bb1e73ce1d21f01f9b329b023e3b40804ed73318d9fc303f1277265c70b4eafd1f222c074080ea7a0eea09bb4ecb2fc2f29cbf508a6eb0a040187320ba86e718a85e4fd88eaa65f8ae00b047676553a4f7414c55a917bb39601329ec007b93983be486e18e1ed249e2adb7f6aad260c7c95e9d9f79980850fd517d7e727d2ed89c0c106857e9511674457e1430567b9da0a6bcc55f1a1b46c796478cdefee1ae26ca454196c737b33f859a8523ea3b7514314abaf5995ed5841cdba5b477a9031a8a2cbe0f26130c19fa5e221893f8ce5a7c788df59d9328e0ea7db24fd95f7684ed51b7fc25b0837b20ce86af81e4cfb1a96ec13e972ce91514f9f51bec9a3ba278492c9cf187940d9bb0d147dca968ae26e2946c6de486eda8a660f256042a943ab139ec138ffcbc6111bd88fcb4f05b473fdf0cacab9b0956a90f2e58a49e1e57697c82e7dce18408a922ce3dad2c9fb83ea588cdc0011ea9bd2ad2b58170cc50f3de3e4a3f3ae02ef608de26e70e46a66b4511f1d1251002153a98aa9ef045f18b68c3362e782e9b3bcdf32df84439b8b41020ea80e6b5dfb922446dd7f2f71859d92b922375fbce01e9651a9e3cae2d275252f1c4a67c4c2a59b2cea56b285dae3c9264de8fd777422df1743fa1a08aae4bfccbdc96518b4d82f933aab60d72a616777c3ea1b0a8185e7653786caf5cf648935542f334adef815f094003b610ee981f275e7faf206fe73ca59e337234a1338e0ecadfff13646b8b461d577606d4cb43c13e0a52ce29e94f7c1b9ca8caac8e806353daf3ad4d26c090bd797ad0a930d3baa76cdfd158861d10d22164df7126fba5604246e65552b9f5d6684b13875cc678ec5b34baacfb651235d048ff68cddb6f8951b2078b66bdc923073073aeabc5fc6cdf101abd6305c86c918d054216d673d76f90a1bcf554db46a1a3889043bb85e32ee6652721889812ce34446d02f1e7cc838825bb0264f9b3d920340eb571243aa7543443d52b12966ec9c6fd28d59bb5dbe055f5b4aa1f4ddcadb0f305344ee251dbcfa07dd975d04b5dca37063193c30638f835f65d57019f37f59d8c0fcb088278ce32136c9a7f543401cbe3327dfde29b8ac5235fe6a8b8be9ff2b15aa21be4da5e357dff841478d3ee94ca68d6ea1ef5d08178c2aef3a089f982a9b331e6cefbc133fca8a45f6f23e992e8c800a3bc81d9c67373b74c749aad0c0e1883396dddf7b79d2e625d848f2da7f3caaaffda04da1a9e526a3dca0af93955e06b6c45b3c3c4136371ba7f4e7052ba5871987536ba29ecbcaa668ae8f681c4fdb3555c773ac38b330108e659e12d19117b8702d7a390f9d60a08de1f2722ac4c3021acb27e2d9a284b07fa808c7920a7424a4ba9696edb7fca03db5f552ec05f0413e3771b22e9e2a364869562c114f0b434983195f2e5ebb067c863b6a362985408bfd439e19a11fb94b0cc5f47f07ed47285cea328e5e11105a7b2e33e5d48110cd45adeb8b6989f8749436ceaef7d37396c6f27e12fb0aa3b22ea7a040c47a7789ac70d2ef7cc3b1aa2fc804216fef5241a7bea439206e8a716801281b110268052ddf1c1031911ebbea93ce19a1de2623980426243e44cbad48a64f8ebb508b552a92dc4691a6e07e595b787bab833455ff300e985a421eb344ff8a02674ffde78468e4047fc8eccca6a591d7d6a5df59b43cd8c7d80096a53fae03ef491fed7bbbc839ff50c0cda50de88f4fd1cd681d4b33ee5eb644c53386d2e383f1d14225b6566cd74a3eb5b90e0a16b05343673a484341076c42844070f25a67c99d3e31afe58b77b7dfd7f9b0cd1b9944964d890e4903c4593c4d5b5e5db15b815b87bc6b9117954f87880cf6daf0c13f8fdeded2a4f9362d6e57c35f936711e3d6089153c10a5baa481f599ec2280369f0badb092fd048c4eceda52979a0c51e107779de9aefdaf2d853cdc174bf6b42e0d081bdda21420e9c1c9a95d9ced3c3d38c63c97b6bf62c8f8c48ec31f2e60c29f27ab222aa687180e0e90de17613aeb9f02402026fd922a03900f1de2e0682618bc5f510d02b3ff4903667876683500a4cbd393fa6abae0de8df980a1d4099f91d8db96d722f16049d6e54a18ddd569881b34977852495c1ecba2a8bfe990b1b58958158f538a1e0a764387626669b88993eade48bf4378cc0f9ee93d3fb7f821d5bbbe8e528e8585dc9ec32f7e06c56b118b0f122b64919bbe56415ffcbcfb6004243028edf91efb53e0249b6f6b170ce064084c3975063a6c1198bb4b61d371f8baaa2ff5916b0c4a59509085188aa7ca82e974971587e27fa7b1df8a8a26538c45411293dfc1322ceec055a93ec53be263f99659adc0710a0d16488b6a7376a5366478e6700c031baf08c82b76073a3aefb8512273c233b10b11202d603010ba7d2b64b9037ad11a11219f93f08fa66b9a5112101bc5ea08ada35911851862dd4c16f53e4e069ab2185e788d8a1254e481095a413d5f672e6b9dd1d29609aee70e3581fef66a47521b9a48e55e908f2dd0e755d64f18ebd4e19da4dfd0c6ad25d6b86ac53f4ce21f097f2831d1b5cfdc923f5d845e9a5fd6bb27b72d9adc463fc4caf4fd8fb0e4d32c84799e19d11dbb698bfd9c91e47a8c348290a1a4a28bb0659919c2fe9e4a427c373f37e535b68cf61362aa728feba8562b0924ce7d6337ae1226b92bda5d986483c698a043a11a4656bb668b5742029a9dcc69a13bb2280cb38df930933ca704448867c9cafc8ce24709338af1019c07d188feca81b5eacdecbddd70419d8549a51d720f67a7aea32b2913e688b6ae315c1754c2fe98c2493d6533fadc8f94654990954ebddf9f7502d5570647cb2976378dd94f2a39ff06acafe1594b6ef80d83fe0cbe360bef0835321328f9fb5670fd7bb10c764def7edee909d5991c524d5705dadf749181b8d12325a61ed9dca0ab5431d1628eaa7269614fe4a7714521d4048d9622f87bd73d1c3e5aad7c877beb6e094fce5b76d0f9de87bb9b5bbe1397e9f9592d35768eae585d3bcaade92bb976f730060a714a8565f02ff86c8a6b86a910e93a8eef47c13d8a4bc699b3d9c37f83930047c64a6e44b48586ab2227360d3881ae1c173158ec02ff6b004e3fc08fe93a3bc2b737113c9b9e973b5bed9756a189724b37d44184d36553c044372830a89962f4edf0b5be08d519b5a56e8705551afee0fbbcdf9613f46be79caaaed5fb09c5631603eee846640a637a313e6303e18a6429b858ce23a48cfd79092eb05e3ccff0881b6def358efa140c7810916c40b3e2e74091ef04cfc0a1caf5a7698af34252de97ae0f722c40d0f23a1938de43254610b4cdaa9eaf4bd6dde2f3a69b96450a07b0593b12a9a2009721c4d1cc9adffc2b5d25d02ea0a6703c5cb777bac007530b2ef97498aa1deab76853eb47ad00e39db0a709c38b8fcf27b123b343ed307a53b93bbfcc3b3099c53853629954b0bbb152470bd599ff13e0a5b7d7b1da0c5e82b14a1beaa149ad7c857ff8741ff1c7b9ca99bbaf2a89409286f7bc251eecaafa4afafbafaec2eb25c7fec0d0ec3a7d3a44ab1c4a60171c50433bf0a791cd27ecae49d9c7a73013ece032159fc50652455d0d21733766a76b4cba3c2e849775321576363f654112461f26a1bfc5e47d93b44480d6be45a845698f65546ad8752b24a6c5e9e15e550714853db748d2e1c7e06d0616baf769472ac7f388087d254dbd64af03ea1d43e360e0ff65d1a135133de36d630ca4f971949c76de43e7ce7b09462fa6c7bdf8bd946292562f52880bdc511e1ab684f98b62bc85bcaa3bab550612f7ee6bfcd4f0fcb6b14966e6ac5290d57a197ab7b715b1a65db168af268bab30cfc670f4be26778eb130df0f82ec3009a856b54f33d935fb76287a2a63113e3089eaa79613ab183007a65faddcf1bb878547754776c5e8478153d13301c7a8885fa1d10b39438751737155aee558449a4cd832a77e53ac701c50da88bd895699a8c00b73c19403a35bc6a1d0ce4a7399499b932686496f4fcf3a22bad16e49734d55f073ea17cc6ee57f524ad3310bbbbab955c9fb00b5ea80467dace9e5b5c9b36a211d729b858dcbd5136da6dda68b875390e7974d12113f3c34c12a50802c18fb5d20b171812609b69125ce0f0cf94afe666887ed64fded8599813020baecc34a5a877634a49b9bc8e2f14c5f23b0b0a63941d9b7e3a351478e71ed5dabcbe823bb7a4fd9d98373f79164db83b17b5f706de0311addee487138331bb1e5a4a25274a0069b2d214323285dc713b948f3147a77bec4cfcc74f5d6da00952d7b54c1770f0dae194ae1d6048ce5530fb35df9a1e4ecdffa5e024d7eb43096a36085ed22e02304d2a4e43b41a14288221249d2494b05488bbfc879b24bca18456f49f75e7f4b4e472f20bb749ff4151a65bdad6c0cc42e53bd16764d7937827ae48261e968b5dc33cb89464dcff146f3d73debd0c888be55c2bc4f6c889fbc53dccbec95a22eb673b3d00520b255df950102d74106661a01e77a738f0651f3b5d1e22b5dbc709b73a1b535587b49118ec0027d42c4cea0fc9723a345073e09c3d2b49bc47d253a98e30822e9c3852b40192ef4c7b5ebe3764f61b7df5fdfe5cae021272d669dc57c704577c3c03ff70204be58d66d2b6858b2deed5fd3b3cd26b0365e114f67ba7a8015dadb832c906ba794ce792f24be5577fc49862b179084de7acded5f0a636dab8fe25d00a1609f4bb63a3c55ba590048cd5f66a4b381b8abfdf0695df71e79936628278f3c86a0cab6bf3ed4453495c983f1ef76669d9e79068fb9a64f4b7fc62e6c2432d27c1dc7bdb50868bb624c501b64ce0b5948e09c97485e925d8b61b0885d203ad213559d775e121bec9d0643edf3bff2209e52e257f34a2b1e3389e667cdbe63385dae6f8a38f458bc2585f4e833"}}, &(0x7f00000000c0)=0x0) timer_delete(r1) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1010.341864][ T3829] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1010.342737][ T3828] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x155f363e, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) timer_create(0x3, &(0x7f0000000080)={0x0, 0x1e, 0x2, @thr={&(0x7f0000000040), &(0x7f00000001c0)="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"}}, &(0x7f00000000c0)=0x0) timer_delete(r1) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1010.551428][ T3828] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:07 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(0x0, 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x100000332, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) fchdir(r0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f00000001c0)=0x78) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x80001) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18, 0x0, 0x5}, 0x18) [ 1010.786043][ T3846] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 09:08:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1010.908866][ T3855] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:07 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 1011.024202][ T3857] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 09:08:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x0, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000040), {[{{@arp={@multicast1, @multicast2, 0xff, 0xffffffff, @empty, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0x0, 0xff]}, 0x800, 0x0, 0x7fffffff, 0x1, 0x2, 0x7, 'bcsh0\x00', 'bond0\x00', {0xff}, {}, 0x0, 0x20}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, 0xf, 0xffffffff}}}, {{@arp={@broadcast, @local, 0xffffff00, 0xff0000ff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0x0, 0x0, 0xff, 0xff]}, 0x9, 0x9, 0x1, 0x5, 0x8, 0x68, 'ifb0\x00', 'bpq0\x00', {}, {0xff}, 0x0, 0x8}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0xa}, @multicast2, 0x8, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@broadcast, @loopback, @empty, 0xf, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) 09:08:09 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x351, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 09:08:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x2, 0x4, 0x3}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)="54335e866aadadabfa38e101f96fc12af79ef4059e51d0da2b3f1ac56f3e6c127c60034792a308cd441e7c332709a3c95b8be555ac03c90b02a76e8ebfff411ef60b83410c2a3d0900f3f2560ebda51eb5445976ea62764b24fd661ddc69c09f8b49245c892927a80d61f15ff488bcedc9bfd90250e3f8d2076d33a25bd76b98661e", 0x82}, {&(0x7f0000000280)="a2f387d8a929f6f5ba752bd4c970eeca4def8029a883eef3a33853f8af4c87454c4dc572973d99f8b7d83974273ca8ace42899e5ac32e7c465097969386d7210d256a531fade588feb674cf208b4b5d272eafad0aed750855f6f66a6c1fec2ae5528d390fefa50ff3d9200fbf8f9dedde8ce2fbfd7ea080c72f7fbc3e260aaa50b7226585a485cfb48a37e96613a6235db30cca3fd9b1ecdbbc3fdad79169644cfaa7b501855dd", 0xa7}, {&(0x7f00000000c0)="a6031e4d253046ec61dbfddd089c24fe258f747ba0cecd576f0700967d70db9d7e4d842f6d3c61fd7f196cc4f06398105ce6b24a2614cbc014b88abb67a2cbdbe4e60d92e2ba248305e1d34e52c026fa159caaebd63d6e0c4cdf5f37b0d2b422f8b2fa65", 0x64}], 0x3, &(0x7f0000000380)=[{0x28, 0xff, 0x6, "5c375b4cb2f0dff09422adde6b681bbf4d24fda9b7"}, {0xe8, 0x101, 0x2, "541ac19561ae822f9079a6e783e731e4c707a861fa4aba08c278ce9f6d76c3c870c51c6e245bad45b6adc42e886bc6eb7ee1a3346df604d25083e8624a44487c88441ff4e5b191b9e71f7be6c1f4187ab30217f9cfbfdaaa5eeff240aa6358daf79c8c401ad3732b9a7eadc3086e13c28fa667171848b5fe9484590e01fea005bfb52bb899f43513f89c851f748d8d814b3dbc155cbef408f441bf93a83be46c305df2b1ac0a9a1aea0df7b8fa6ebe5f25c208fbdbb8e877e5a5ec54d34f2aa50edd5744ea542485c3f2c7245d06765b64ef55a181"}], 0x110}, 0x8000) 09:08:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xc, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:09 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(0x0, 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:09 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 09:08:09 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x100000001) syz_emit_ethernet(0xfe82, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2000, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x5, @loopback, 0x20}, 0x1c) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:09 executing program 1: mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x350, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000080)={0x0, "318d5e76e280052718a8b97d842c6b4f6742d0ac000421ed1f03f34342448e94", 0x1, 0x1}) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1013.731264][ T3913] validate_nla: 6 callbacks suppressed [ 1013.731276][ T3913] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0xa, 0xe) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f00000001c0)={0xb, @output={0x1000, 0x0, {0x8}, 0x7aa, 0x5}}) [ 1014.191470][ T3922] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1014.211050][ T3922] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:10 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x352, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:10 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfffffffffffffca3, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xd, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:10 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(0x0, 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 1014.439734][ T3935] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:10 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r2 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x9, @local, 0x1}}, 0x8000, 0x3, 0x7, 0x0, 0x80}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e23, @empty}}, 0xd0, 0xfffffffffffffff8, 0x5, 0x0, 0xd71}, &(0x7f0000000280)=0x98) 09:08:10 executing program 1 (fault-call:1 fault-nth:0): bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1014.602260][ T3946] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1014.624135][ T3946] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1014.699082][ T3954] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:11 executing program 0: r0 = dup(0xffffffffffffff9c) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)}, 0x2) 09:08:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:11 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x4a0000) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000080)=""/122) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000100)={0xfb26, 0x4}) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1014.932364][ T3965] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1014.960388][ T3967] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:11 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x353, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:11 executing program 5: mkdir(0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="89102ac3a6f1082a4a6f378e2f3f44cca7cdbd63e18baa862cacb642e2d98b0636d32ecca7c2cfb7ee77957b6307518cac4db1d74a2cdb05a3cd1609841a485f8e031fa7e8816890cd427b0dc9444c48a39f7c46ccfe5a246d778a25d65e3b64c768a76a2fff5be24f06f2073574083f302f1a3022d7d1f66069ac4bd4fd97c57ff41ae450709d83b05153dee1f2f407058d7f46dd75476df2d06009ffa44491c5159c4b946a48734e27cb67442d29aaaf5b6bcd5c84906b43da522349dcfee62432ba1439438526c50aa07c7a6ce0a8132ffcb1c7105b7b477078", 0xdb}, {&(0x7f00000001c0)="31e3decd45506e4355151257d90fbf6db25063c0d198fa52d4774901294e9978591ff23ce605a563544fbfee8e6035d9b514e2ed10a5df400be42f829c473d239330dbe742081a9280fe9f6726d965525a9d79338c502c9d", 0x58}, {&(0x7f0000000240)="07899f30457de39d31b824fb17f1dc6a4668719203e565815c68511d6b90f35b2b14c8a0eae17feb1c72103957bc497b8a975bb501dc261aae6a7de6139ea8d1bc8ca214d7cd316b45877ee7cb7428b105fe71f2b38b030a21638d58924fe94ea9487e27f45921ec", 0x68}], 0x3}, 0x200000c0) [ 1015.300884][ T3977] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:11 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x0, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x5, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffffff2c, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r2 = getpid() ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000000c0)=r2) 09:08:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x6, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x7, 0xffffffffffffffb5) r1 = open(&(0x7f0000000340)='./file0\x00', 0x40, 0x8) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000001c0)={0xffffffffffffffc0, &(0x7f0000000100)="00954be3667c314563a0da2564eac6c9cc9b95cac41ee050d59dbfe8abc0afc01c405a456b5234408731de6e76ac1f0f422595db6393"}) r2 = socket$inet(0x10, 0x3, 0xc) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000002c0)={0x1, 0x7fff, 0xfffffffffffffffa, 0x5, 0x1}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x521840, 0x2) fanotify_mark(r3, 0xc2, 0x8, r0, &(0x7f0000000280)='./file0\x00') ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000080)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x7, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x3) socket$bt_hidp(0x1f, 0x3, 0x6) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 09:08:12 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x354, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$9p(r1, &(0x7f0000000100)="a013decbed6d7ac92ebdb22491c65523718f1933f9b36a193c45c1", 0x1b) syz_emit_ethernet(0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000001400)={&(0x7f0000000240)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000002c0)="e99ca03c5d5d39a18570a095766f7be6b69fb47e493f9257fca5f4271933795a0ce81b3b22461fbf392f0552104947195d261aa1fa272548af3713e77adc7b46a5c48f9165f36b39f5f6d571974b421e046a2473262e42586071c0fcb1f0771c3bc1ff1176f1b1c1a6bf3adb9951aa56ad31073695e637984a5f347505e54f734de3c57df0b88876721ff7cf1581c8d7d0347d4b993b38dec0cf4ce91b0583c6e4b12e14e0cd13af4bc9369605b3ae9262947322b5056c70d9dbe85b4fec952c84cc11dcf6543972c8d85c21d61ab52909a41701d16f89a4e0c350aa540c87653ad4d724d31066be259956a4a932c6b12f32ff48f981616fd4a6b4436b0d50664245d0f45275f9dc05f610f3c25af85e5843e10b8e929ec1d364df1641967fbe0c4c7b171204849b3bb42e41d09887143dead0106defbf53014142ff9b8b5c87cf28b33a093118cfae13b0920596ad250976db845a7476f774080fdc9b619751df2788503ddd4006cc9d6e8166d3a4a2eefb58aed5812a04a0dd2119a6cd9b32c87d6fa2b9cabda17ac594897263bfa0da2d43ba7838faf248d995e084daf3e313f5b26310cba8507cd0a75333c0a51a8fbe43bed2fda13973049a6db84772f00507fcb8647414c77f6cb217322d507966b5c15df832266176fd0cbd3f10491d11e3eac714062786760080930c9a8599d4f0a1d0b5033624d336aadf7a10623f07da913a8885711585c4e59a79eecd6c0755249ce1bfefc30bc2a8348589af1ccfe85d140541fdb8fd19253a9e9395ce0d1610da17edfcec3750479fd081336e302067202c79238be3e0c2898635330c8dff5b48e410994ef7f6155bcb47af97c2aab239e29416fb68159d864b17474ef193a6d190d0353cabc0c487b4df2db08b0a367af5f4406434a6303163eee6f958e21f69cade136dd88dad0f65edaa646469bfa9ade371efe81d4a2d2cc7f9f74d3868d891522308c23dcc5943abdce1dc8ed0baaf84be47f8ade034bf639d1f210d3d929e9c0d5e26b3e1b8fc82a19e5c2b33b11581a898816ecc213e08e71a528f2f83034de4e755c2ea9b988f606a4a0305829ec9b282ee0accb09228a2c4d37bfc463ff4f54af06e2034860e1a523918321bf11b32b89b68e47f4e3bb2b8c0e7e92f848ee6de7b4ec37a4726f8cfa3e43ae4ea7dac22868ef5f1d1963362a02f6961a18ee8f73198232d97d69c75515df3aebddeed9e4407ead8b6c3a607daa3b541cc8155ea60472bde1ccbd6539a6dabb8d6146c70f1da0294203cf46b9b5c1ba46ab44842a576a5cbbdbf75b6210c1c289be2aec1818920b2a51313b3db40ee1a1e23dbe6f8f8f9e68ec319d81ed588a6b6d159f0a630be322ce84dcbdc343da53bda885f2519c686015a95659d90b0f65c5c3d8724ba3c531bbb227ccc9fe5abe91074f171164e51fc31ebfa0f04f23f4eac9e61b7fc161e5c3eaaef288ec1d77f3f022586887885f70419a8ccd03360bb54bb75b7a3855361d7878007fa762b4d177da8b5a726238f9858c49caaaefe35ab145cdefce1d014ccbfcdc045b5f0e720a27f58306d6f0134d63b3c3169f1e713a36ebc16329d1b6442a3cb76fad56dada1f961ed3c706165e076ef38b8ba82c93953038682ca72b19ae36aab47c3a6d301a3c1397ad31654ab248b037c471d8e3f2b2267002c00f0cb03b57d5400383430a6b896e5ebf954aad55d8e7ad1ae341f43fb967f45fdd6120b6cc4a71876ec0e05b16ab873125999d9d513af32997c3ebc05554b2a75e753ee48bcfa7ad570c91615d1caa141c52087e58b48938f5b005d0ebc447a18f529383278dd839272b5609e84555ac9381f867ef849715b3e86fad366bc37e995243bb60a62d1fdc8b2e228985b82d50275e4ac3aac8cadf6b0fe1681c8642b77b2aa53cc2eb24c1992691ec8987a6075360ad0c5c753b99aa2908a25e1ff98a3f9aab63878a9e6dd5e94dddd4bb9ab36b67bbcfe91ebf19f653c61456c8bab131ea05dd9673c4868a7b5a1c701c9f06a803ec7a58f324052f58732b62a4c6949b64c54f5651ed6068571c3469497029c651d60a92b12de25d375ada36e9baf9f5c857913cf4652031f808b27759b10d32aac78187d7d2de25cffdfb3ffd9b006c43435f0b719e7e1bee333ab2108e9eb9d75fb64e5955c83324aa0368470b55479fbc7d4a666b76a42f95607a2d33e31ce470ebb1e9454ec635b905db781421704fcbbbc9d844be49dac149aedbd927ffbc1cc6601bf2e3b50d79d64ec773df87e418492e6959c21e7221565d2c4961771c2af450b7d5eea7b4a6634e6f4b80a655f98929c4792bcbf281802abd804b24cc67aea9934fda25215376230ac9033b6be75322ade026e481ae48769fc2403d8ba4b0bd89ce85dc486b182971696af3841837c967752e2d24eb89f262b804084f37ebde64c3179744288f6e3b0fc454031935b7f99bf7f1e3462ea13d00090164cbd31ce51108c5622070df1e74daab69458c0db23502e861e385986152d5b2b4f37b138d5a7260de14b34d721f8b5ee53f34f651ec98d29eae185227dc45f2ad78a41a5549bd7ae3e8fd54ca0a9503d3a0cb5d3958062f114c549d0c9dadcf0d9106aef37018aa1a30260c462a5e66d437ec6e0d630f75165a967062e3d5e7f64cdcc2675f19d7ef5de59dfebbabf4fa43b8cc99ef0134a1acebb8eaf2dd891e357e104f88519b6928fd539946e28ed02d0ddbb96fcb0847aae93e406af061763f822bed7d5b36c5e9cadec9573d6ae2b867abe24b67ac7e34e49fdf78bcdba09064bcf4f11f5735c73999fbfcf7aea3a2cf667cd29900d521fd3af8fe6b3c0fc2f2546703925bc807acf76bee31e307325246e17bab841f8e908d7e152cde87e3ae7f21b7546b5b8d462a5f05fe4a77f459dd00edc2d98d128e0ccdabe5ed34ffc1e6244439c03d78e5020d21d21e4a3eb5988f857bb573a6504705d74d3fdb65389330078dd61d0c8c52281d09f1125cac783d619c06dd44e2368ae4e435b68a8635c3d5a6242f29b2dd7bb82b65a47397333dde03496d5fd812d1e1d88075e5f5a201d8a536eda77863dd1c631d54ca0f5664fdc22c5cb2d7c93cc1369e9ba68d29dead24d8721df9b0a22fe2e479bf5deb85bf9bcd582c46f7183ace5995d7192f81c0f31c52d17343db502f02c529ba392610bd01e8c5e1f72a3711b406524c52b64707ba545b44f803fc39d71362f5a0349de813fa008e3cb9ac2bcd97c7ffec156747e3ef27a811e6e918a0e6cfad05f45fe48946e58fa8e2631e3d7253d2be90288506f20c70c90c81fff9066aa7bb822c462d166c2a1202162336da1d5b9aa9884aedd5e4857ebbd082b6855762ead832ffffb9a2a4fdb4fdcfcef49d6039d2bfd27a2b909264561633c964eb80d8125cb834d2377beaa9c1bad8ee488dfc7cfb48e7225aa4a22d66f5ac3141332efa07f7b683424485018adb60be5b78f2d68d97ec5c82bf1df38b281ac688149a8cde124b23089e5c947807d9315681b54a9f978b2b4dca35a2c43fc89d4ea3a30e830594b93e9a6e46b8e94d484349f9b177bc263ad6198b3e0cc5f1e1142e05c2814f4f554d899563046db006a58ee31d9fd4be0dc4df5793f7170e75ff73d2377d03b618c3c7779aa3b4b9315b7ca1f703b72a40808f7ba5da11b1d031ca4f9129296a28ef4779c777ce0fbc08bf1ebf14780e34c353860044092a793c643d06451c6a6c7671f393d8bf0a9a23d694a22cae5b8cffcd03f3a34847c34e6a712795895f8ca99d50004c0368b936d1b52c5c2ce5bdb739890c8bd0051793d11d71f8a0cc9d82a1ba796aa6c10169d4733687de14c30f946c920b7bfdbd5ad3b654628475314eb949f2d7c0eea55cbdd86033024164e5d60a14cfedbc4cc889cf934dd8f4daf3609c278b44b5ae82e0a58bb3b9e34c3192778ab9c63e174799bef783a408e9029f565c74ab61986e3e0ca2f759c16d4efe3bc545e8d76f64910492b95d2cda44bbf7825240ace59f1ef5932a9956979c17a2d7c9b679e2fb9492c2b4159fe03277a9b2b79e28142c94709698d38dc57de74b75f14ed172a1a8f3bca738721eb2f01d223c01a0f2692879945e38fb82149868dcbc89a5da4729caf486b5e5310ca8bf7701d0baab960cfa99acac8b6c0d72a9e1f03509d360f263d162894351d7d94baf2fc2ba22633e8aa5ccd686b113015d9afc112c287444acb6268787c777fd496a61da708b2d94a66636dca005c3b31f60369125da3634d0352877d478d0c08fcbdf98dbf4dab506cadc350b5f7fa58e031d2785f6e1b1eabd736a4d2580b6a3f2661a7489804a603c9f70009ba82082e1748f71e9bd08caeac5328cca0bab82b3dd2f2a3df129dba42a34887aa48a6ecbb22addfb89422d8898bf5295320a6e5bb1070ebd3cf5461a7eea407609cdb5b678a97f3c323266f1e5e838cb5f135a4fd3a155870184c68381653646fe1a9414393a87a0763b5ff6a81451cf599c230c9165cb0146e920deaba0f675b0884e8988c3b0fc75e59e13b316d57aa3773a11afffe112928fb1785970be06a55de98fb85a3bf6869034dfb227430d231695364a06bb400f08e6d954720487847bf0fca2a99dbee59ebc4bff966959a323b35b73af5a6cbbeb512c621e259bb269cd1babd4a07fc5f8370f6ba8c28df12a1ef8a9ee38efcb54e8728b983d4cc9fd48bf7e53d7df5d36aed2c114a14f44e2236aa26324ce978578fded069762a005c04291897be2b7c0bd298d2f0f8bdb30a1fa0067c960ec3ecdd1428c0b8437a9851811ff1e5656ebfcd9be87d35305501a2a61da41ed6a4ee55e5ba75587b98ad89038ab10ca1816277fe0be4f8b02f59ce654e62016bf6bde7a800eabfde6fc73ecc30b48b695e9abe4e43b9138fd6a4b0627a0d7ed80e68c26f730dc5361feed2b60816292bb963c58b0db9f7106c2701581594c951ef0249308adb957958bf341bfffe0f279da0d7d8f49b3013033f302cd6d4533bbd03868e88af266cc4d05b3808d82cb5f1fccc3b5a56ffd74fe08fcee560713ae409e03d5f259d58f5eb51b09d606ad34780b1efa135fa54a1357ba89eedf0573f3acd5bf611a650264525a0bd83d5af367ba9165c18f78333fd1afdb7d7e56a7ce8b995e887e8f215933cf11865ebb12d6ec414b8fb18c4adbabfb229678ae90b7289c49bf137b8398418ea9d3c3fee63529aa80d87151333c3eb5cf62d901e3f3ba51a46928e40561b15f1132d1a958ecf47739e293edf8455824f3c1c885bbec042acf34a19af6a320b3bfa6ed1a1ff7e8621f300c3b66bc4eb0dcc60864277229bdcde7129d8b9ad6b95008f9b2d06ee6cca76a7d12e3b89884b77af137eb9aa8a92e85cf63898ecd8bd68e59bb2959f3eb8fcdf5a5edf66eb5b37190154b0098163473ac155b5e7dc1471a5c8da3e310402b28ff7cec24850f21c52605b61b516f90feaae4214b000a5427adb494204fac6c18bacd88b5bfc6095644f94654941cbf8b5d31d2004b7d748bed444eeecdf74221067fb93041edad5a762a000b4977d978dc7b89938b2a4f0a75c5e54f89e9a0eb0e686da702f3f1dea25b845f2306b1284b1156f37ed03f3b5590d2a11d4770b3e4f414a75bc1c6da93bdd816be36f33576db878d5d7a2402281f61b8c5b2a29297b6fb00dd829e01945768f546441964b7b5b64f5c876bed80207a5ee20a7c0d62159328812b9f702fb92eaee976db4358540f57a56b9000318711877f8ce4bfbebcddc494f53cbe6beaa", 0x1000}, {&(0x7f0000000080)="b2c6c1157a4cb21df4726144bbb8", 0xe}], 0x2, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x108}, 0x20000000) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000200)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x8, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:12 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x0, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:12 executing program 5 (fault-call:3 fault-nth:0): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503000, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e24, @remote}, {0x306, @broadcast}, 0x2, {0x2, 0x4e22, @remote}, 'hsr0\x00'}) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x9, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1016.291189][ T4025] FAULT_INJECTION: forcing a failure. [ 1016.291189][ T4025] name failslab, interval 1, probability 0, space 0, times 0 [ 1016.379623][ T4025] CPU: 0 PID: 4025 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1016.389051][ T4025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.399325][ T4025] Call Trace: [ 1016.402866][ T4025] dump_stack+0x172/0x1f0 [ 1016.408455][ T4025] should_fail.cold+0xa/0x15 [ 1016.413179][ T4025] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1016.419750][ T4025] ? ___might_sleep+0x163/0x280 09:08:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0xa, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:12 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x0, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 1016.426850][ T4025] __should_failslab+0x121/0x190 [ 1016.433127][ T4025] should_failslab+0x9/0x14 [ 1016.438982][ T4025] kmem_cache_alloc_node_trace+0x270/0x720 [ 1016.445079][ T4025] ? mutex_trylock+0x1e0/0x1e0 [ 1016.450194][ T4025] __kmalloc_node+0x3d/0x70 [ 1016.454758][ T4025] kvmalloc_node+0x68/0x100 [ 1016.459289][ T4025] alloc_netdev_mqs+0x98/0xd30 [ 1016.464083][ T4025] ? sl_free_netdev+0x70/0x70 [ 1016.468797][ T4025] slip_open+0x38e/0x1138 [ 1016.473287][ T4025] ? sl_uninit+0x20/0x20 [ 1016.477784][ T4025] ? lock_downgrade+0x880/0x880 [ 1016.482666][ T4025] ? sl_uninit+0x20/0x20 [ 1016.486946][ T4025] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1016.501939][ T4025] tty_set_ldisc+0x2d7/0x690 [ 1016.506916][ T4025] tty_ioctl+0xe69/0x14d0 [ 1016.511810][ T4025] ? tty_register_device+0x40/0x40 [ 1016.519737][ T4025] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 09:08:12 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f00000000c0), &(0x7f00000001c0)=0x60) stat(&(0x7f0000007140)='./file0\x00', &(0x7f0000007180)={0x0, 0x0, 0x0, 0x0, 0x0}) recvmmsg(r2, &(0x7f0000006e40)=[{{&(0x7f0000000300)=@nfc_llcp, 0x80, &(0x7f0000000700)=[{&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000400)=""/244, 0xf4}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/206, 0xce}, {&(0x7f0000000640)=""/160, 0xa0}], 0x5, &(0x7f0000000780)=""/16, 0x10}, 0x8}, {{&(0x7f00000007c0)=@tipc, 0x80, &(0x7f0000002b80)=[{&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000002840)=""/9, 0x9}, {&(0x7f0000002880)=""/253, 0xfd}, {&(0x7f0000002980)=""/152, 0x98}, {&(0x7f0000002a40)=""/66, 0x42}, {&(0x7f0000002ac0)=""/34, 0x22}, {&(0x7f0000002b00)=""/60, 0x3c}, {&(0x7f0000002b40)=""/52, 0x34}], 0x9, &(0x7f0000002c40)=""/119, 0x77}, 0x2}, {{&(0x7f0000002cc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004280)=[{&(0x7f0000002d40)=""/152, 0x98}, {&(0x7f0000002e00)=""/82, 0x52}, {&(0x7f0000002e80)=""/42, 0x2a}, {&(0x7f0000002ec0)=""/250, 0xfa}, {&(0x7f0000002fc0)=""/37, 0x25}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/92, 0x5c}, {&(0x7f0000004080)=""/219, 0xdb}, {&(0x7f0000004180)=""/242, 0xf2}], 0x9, &(0x7f0000004340)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000005340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80, &(0x7f00000063c0)=[{&(0x7f00000053c0)=""/4096, 0x1000}], 0x1, &(0x7f0000006400)=""/109, 0x6d}, 0x7}, {{&(0x7f0000006480)=@can, 0x80, &(0x7f00000067c0)=[{&(0x7f0000006500)=""/178, 0xb2}, {&(0x7f00000065c0)=""/15, 0xf}, {&(0x7f0000006600)=""/251, 0xfb}, {&(0x7f0000006700)=""/61, 0x3d}, {&(0x7f0000006740)=""/24, 0x18}, {&(0x7f0000006780)}], 0x6, &(0x7f0000006840)=""/178, 0xb2}, 0x6}, {{&(0x7f0000006900)=@ax25={{0x3, @default}, [@netrom, @default, @rose, @rose, @bcast, @rose, @netrom]}, 0x80, &(0x7f0000006d00)=[{&(0x7f0000006980)=""/95, 0x5f}, {&(0x7f0000006a00)=""/12, 0xc}, {&(0x7f0000006a40)=""/31, 0x1f}, {&(0x7f0000006a80)=""/103, 0x67}, {&(0x7f0000006b00)=""/213, 0xd5}, {&(0x7f0000006c00)=""/232, 0xe8}], 0x6, &(0x7f0000006d80)=""/161, 0xa1}, 0x1}], 0x6, 0x40002002, &(0x7f0000006fc0)={0x77359400}) sendmsg$nl_route(r2, &(0x7f0000007100)={&(0x7f0000000200), 0xc, &(0x7f00000070c0)={&(0x7f0000007000)=@ipv6_newroute={0xc0, 0x18, 0x401, 0x70bd2c, 0x25dfdbfb, {0xa, 0x0, 0x0, 0x4, 0xff, 0x3, 0x0, 0x6, 0x2000}, [@RTA_EXPIRES={0x8, 0x17, 0x4}, @RTA_PRIORITY={0x8}, @RTA_ENCAP={0x7c, 0x16, @generic="a8662a5f86083e5fa802e7bb25230816618bd84d9af9950ff57ac1cee70d534473fe5c215217c214a5898f62ee3164e7d022f019f545a1958c04ab8ddf6d1b0ab5577f7a638d854d1495d55b63d9126562061318118de20f4d2ee4dd7606af7dc1570149aafefb124921a04a8ceda144447dd754eb3eb706"}, @RTA_UID={0x8, 0x19, r3}, @RTA_OIF={0x8, 0x4, r4}, @RTA_MARK={0x8, 0x10, 0x2}]}, 0xc0}}, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1016.529772][ T4025] ? tomoyo_init_request_info+0x105/0x1d0 [ 1016.540561][ T4025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.549462][ T4025] ? tomoyo_path_number_perm+0x263/0x520 [ 1016.558252][ T4025] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1016.565292][ T4025] ? __lockdep_free_key_range+0x120/0x120 [ 1016.565490][ T4025] ? __fget+0x35a/0x550 [ 1016.578376][ T4025] ? tty_register_device+0x40/0x40 [ 1016.578399][ T4025] do_vfs_ioctl+0xd6e/0x1390 [ 1016.578422][ T4025] ? ioctl_preallocate+0x210/0x210 [ 1016.595161][ T4025] ? __fget+0x381/0x550 [ 1016.599702][ T4025] ? ksys_dup3+0x3e0/0x3e0 [ 1016.605399][ T4025] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1016.612718][ T4025] ? fput_many+0x12c/0x1a0 [ 1016.617257][ T4025] ? tomoyo_file_ioctl+0x23/0x30 [ 1016.624864][ T4025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.634798][ T4025] ? security_file_ioctl+0x93/0xc0 [ 1016.640117][ T4025] ksys_ioctl+0xab/0xd0 [ 1016.644318][ T4025] __x64_sys_ioctl+0x73/0xb0 [ 1016.649677][ T4025] do_syscall_64+0x103/0x610 [ 1016.654290][ T4025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1016.660636][ T4025] RIP: 0033:0x458209 [ 1016.664568][ T4025] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1016.685923][ T4025] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1016.697491][ T4025] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 [ 1016.707469][ T4025] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1016.716340][ T4025] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 09:08:13 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e20, 0x7f, @empty, 0x3}, {0xa, 0x4e21, 0x1f, @remote, 0x4}, 0x5, [0x7, 0x7, 0x1, 0x4, 0x3, 0x80, 0x7, 0x100]}, 0x5c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x62) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1016.727114][ T4025] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 [ 1016.735993][ T4025] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 09:08:13 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x355, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:13 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0xb, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:13 executing program 5 (fault-call:3 fault-nth:1): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0xef}, 0xfffffffffffffffd) inotify_init() [ 1017.108354][ T4061] FAULT_INJECTION: forcing a failure. [ 1017.108354][ T4061] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.150025][ T4061] CPU: 1 PID: 4061 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1017.158065][ T4061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.168235][ T4061] Call Trace: [ 1017.171546][ T4061] dump_stack+0x172/0x1f0 [ 1017.176084][ T4061] should_fail.cold+0xa/0x15 [ 1017.181496][ T4061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1017.187512][ T4061] __should_failslab+0x121/0x190 [ 1017.192738][ T4061] should_failslab+0x9/0x14 [ 1017.197266][ T4061] kmem_cache_alloc_trace+0x4b/0x760 [ 1017.202676][ T4061] __hw_addr_create_ex+0x5e/0x310 [ 1017.207738][ T4061] __hw_addr_add_ex+0x1ef/0x2b0 [ 1017.212702][ T4061] dev_addr_init+0x118/0x200 [ 1017.217320][ T4061] ? dev_mc_flush+0x40/0x40 [ 1017.221851][ T4061] ? __kmalloc_node+0x4e/0x70 [ 1017.226562][ T4061] alloc_netdev_mqs+0x142/0xd30 [ 1017.231528][ T4061] ? sl_free_netdev+0x70/0x70 [ 1017.236243][ T4061] slip_open+0x38e/0x1138 [ 1017.240699][ T4061] ? sl_uninit+0x20/0x20 [ 1017.245262][ T4061] ? lock_downgrade+0x880/0x880 [ 1017.250667][ T4061] ? sl_uninit+0x20/0x20 [ 1017.255372][ T4061] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1017.260949][ T4061] tty_set_ldisc+0x2d7/0x690 [ 1017.265568][ T4061] tty_ioctl+0xe69/0x14d0 [ 1017.270024][ T4061] ? tty_register_device+0x40/0x40 [ 1017.275156][ T4061] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1017.281423][ T4061] ? tomoyo_init_request_info+0x105/0x1d0 [ 1017.287173][ T4061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1017.293524][ T4061] ? tomoyo_path_number_perm+0x263/0x520 [ 1017.299291][ T4061] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1017.305306][ T4061] ? __lockdep_free_key_range+0x120/0x120 [ 1017.311071][ T4061] ? __fget+0x35a/0x550 [ 1017.315273][ T4061] ? tty_register_device+0x40/0x40 [ 1017.320548][ T4061] do_vfs_ioctl+0xd6e/0x1390 [ 1017.325994][ T4061] ? ioctl_preallocate+0x210/0x210 [ 1017.331594][ T4061] ? __fget+0x381/0x550 [ 1017.335816][ T4061] ? ksys_dup3+0x3e0/0x3e0 [ 1017.340389][ T4061] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1017.346650][ T4061] ? fput_many+0x12c/0x1a0 [ 1017.351111][ T4061] ? tomoyo_file_ioctl+0x23/0x30 [ 1017.356949][ T4061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1017.363221][ T4061] ? security_file_ioctl+0x93/0xc0 [ 1017.368377][ T4061] ksys_ioctl+0xab/0xd0 [ 1017.372565][ T4061] __x64_sys_ioctl+0x73/0xb0 [ 1017.377182][ T4061] do_syscall_64+0x103/0x610 [ 1017.381805][ T4061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.387731][ T4061] RIP: 0033:0x458209 [ 1017.391654][ T4061] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1017.411274][ T4061] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1017.419819][ T4061] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 [ 1017.427818][ T4061] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1017.435816][ T4061] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1017.443815][ T4061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 09:08:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x10, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0xc, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000, 0x2, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) [ 1017.451902][ T4061] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 09:08:14 executing program 5 (fault-call:3 fault-nth:2): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0xd, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{&(0x7f0000000040)=@x25={0x9, @remote}, 0x80, &(0x7f00000001c0)=[{0xfffffffffffffffd}, {&(0x7f00000000c0)=""/83, 0x53}], 0x2}, 0x8}, {{&(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/72, 0x48}, {&(0x7f0000000300)=""/43, 0x2b}], 0x2, &(0x7f0000000380)=""/166, 0xa6}, 0x7}, {{&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000700)=[{&(0x7f00000004c0)=""/194, 0xc2}, {&(0x7f00000005c0)}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/137, 0x89}], 0x4, &(0x7f0000000740)=""/116, 0x74}, 0x80000000}, {{&(0x7f00000007c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/249, 0xf9}], 0x1, &(0x7f0000000980)=""/195, 0xc3}, 0x1f}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000a80)=""/210, 0xd2}, {&(0x7f0000000b80)=""/122, 0x7a}, {&(0x7f0000000c00)=""/150, 0x96}, {&(0x7f0000000cc0)=""/246, 0xf6}, {&(0x7f0000000dc0)=""/78, 0x4e}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001e80)=""/13, 0xd}, {&(0x7f0000001ec0)=""/7, 0x7}], 0x9, &(0x7f0000001fc0)=""/62, 0x3e}, 0x181f}, {{&(0x7f0000002000)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002080)=""/232, 0xe8}, {&(0x7f0000002180)=""/248, 0xf8}, {&(0x7f0000002280)=""/238, 0xee}, {&(0x7f0000002380)=""/169, 0xa9}], 0x4}, 0x2}], 0x6, 0x10000, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000002600), 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x803, 0x7) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:14 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 1017.730511][ T4087] FAULT_INJECTION: forcing a failure. [ 1017.730511][ T4087] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.777273][ T4087] CPU: 0 PID: 4087 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1017.785310][ T4087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.795505][ T4087] Call Trace: [ 1017.798832][ T4087] dump_stack+0x172/0x1f0 [ 1017.803309][ T4087] should_fail.cold+0xa/0x15 [ 1017.807930][ T4087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1017.813760][ T4087] ? ___might_sleep+0x163/0x280 [ 1017.818635][ T4087] __should_failslab+0x121/0x190 [ 1017.823634][ T4087] should_failslab+0x9/0x14 [ 1017.828165][ T4087] kmem_cache_alloc_node_trace+0x270/0x720 [ 1017.835650][ T4087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1017.841952][ T4087] ? dev_addr_init+0x17f/0x200 [ 1017.846805][ T4087] __kmalloc_node+0x3d/0x70 [ 1017.851344][ T4087] kvmalloc_node+0x68/0x100 [ 1017.855849][ T4087] alloc_netdev_mqs+0x67f/0xd30 [ 1017.860706][ T4087] ? sl_free_netdev+0x70/0x70 [ 1017.865392][ T4087] slip_open+0x38e/0x1138 [ 1017.869758][ T4087] ? sl_uninit+0x20/0x20 [ 1017.874004][ T4087] ? lock_downgrade+0x880/0x880 [ 1017.878862][ T4087] ? sl_uninit+0x20/0x20 [ 1017.883193][ T4087] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1017.888310][ T4087] tty_set_ldisc+0x2d7/0x690 [ 1017.892926][ T4087] tty_ioctl+0xe69/0x14d0 [ 1017.897288][ T4087] ? tty_register_device+0x40/0x40 [ 1017.902426][ T4087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1017.908797][ T4087] ? tomoyo_init_request_info+0x105/0x1d0 [ 1017.914526][ T4087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1017.920807][ T4087] ? tomoyo_path_number_perm+0x263/0x520 [ 1017.926475][ T4087] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1017.932283][ T4087] ? __lockdep_free_key_range+0x120/0x120 [ 1017.938000][ T4087] ? __fget+0x35a/0x550 [ 1017.942154][ T4087] ? tty_register_device+0x40/0x40 [ 1017.947263][ T4087] do_vfs_ioctl+0xd6e/0x1390 [ 1017.951885][ T4087] ? ioctl_preallocate+0x210/0x210 [ 1017.957005][ T4087] ? __fget+0x381/0x550 [ 1017.961176][ T4087] ? ksys_dup3+0x3e0/0x3e0 [ 1017.965619][ T4087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1017.971860][ T4087] ? fput_many+0x12c/0x1a0 [ 1017.976305][ T4087] ? tomoyo_file_ioctl+0x23/0x30 [ 1017.981421][ T4087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1017.987669][ T4087] ? security_file_ioctl+0x93/0xc0 [ 1017.992777][ T4087] ksys_ioctl+0xab/0xd0 [ 1017.996929][ T4087] __x64_sys_ioctl+0x73/0xb0 [ 1018.001528][ T4087] do_syscall_64+0x103/0x610 [ 1018.006115][ T4087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.012013][ T4087] RIP: 0033:0x458209 [ 1018.015918][ T4087] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1018.035528][ T4087] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1018.043944][ T4087] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 [ 1018.051948][ T4087] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1018.059932][ T4087] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1018.067910][ T4087] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 [ 1018.075902][ T4087] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 09:08:14 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x356, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:14 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x1) syz_emit_ethernet(0xcd, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0xe, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0xf, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:14 executing program 5 (fault-call:3 fault-nth:3): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x11, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:14 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x10, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1018.472032][ T4113] FAULT_INJECTION: forcing a failure. [ 1018.472032][ T4113] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.544030][ T4113] CPU: 1 PID: 4113 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1018.551992][ T4113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.562801][ T4113] Call Trace: [ 1018.566210][ T4113] dump_stack+0x172/0x1f0 [ 1018.570658][ T4113] should_fail.cold+0xa/0x15 [ 1018.575375][ T4113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1018.581233][ T4113] ? ___might_sleep+0x163/0x280 [ 1018.586117][ T4113] __should_failslab+0x121/0x190 09:08:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x11, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1018.591108][ T4113] should_failslab+0x9/0x14 [ 1018.595638][ T4113] kmem_cache_alloc_node_trace+0x270/0x720 [ 1018.601470][ T4113] ? kasan_unpoison_shadow+0x35/0x50 [ 1018.606792][ T4113] __kmalloc_node+0x3d/0x70 [ 1018.611334][ T4113] kvmalloc_node+0x68/0x100 [ 1018.615857][ T4113] alloc_netdev_mqs+0x821/0xd30 [ 1018.620768][ T4113] slip_open+0x38e/0x1138 [ 1018.625132][ T4113] ? sl_uninit+0x20/0x20 [ 1018.629479][ T4113] ? lock_downgrade+0x880/0x880 [ 1018.634372][ T4113] ? sl_uninit+0x20/0x20 [ 1018.638641][ T4113] tty_ldisc_open.isra.0+0x8b/0xe0 09:08:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x12, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1018.643788][ T4113] tty_set_ldisc+0x2d7/0x690 [ 1018.648395][ T4113] tty_ioctl+0xe69/0x14d0 [ 1018.652736][ T4113] ? tty_register_device+0x40/0x40 [ 1018.657903][ T4113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1018.664252][ T4113] ? tomoyo_init_request_info+0x105/0x1d0 [ 1018.670092][ T4113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1018.676355][ T4113] ? tomoyo_path_number_perm+0x263/0x520 09:08:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x13, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1018.684102][ T4113] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1018.698440][ T4113] ? __lockdep_free_key_range+0x120/0x120 [ 1018.704205][ T4113] ? __fget+0x35a/0x550 [ 1018.708390][ T4113] ? tty_register_device+0x40/0x40 [ 1018.713539][ T4113] do_vfs_ioctl+0xd6e/0x1390 [ 1018.718154][ T4113] ? ioctl_preallocate+0x210/0x210 [ 1018.723304][ T4113] ? __fget+0x381/0x550 [ 1018.727581][ T4113] ? ksys_dup3+0x3e0/0x3e0 [ 1018.732028][ T4113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1018.738291][ T4113] ? fput_many+0x12c/0x1a0 [ 1018.742737][ T4113] ? tomoyo_file_ioctl+0x23/0x30 [ 1018.747712][ T4113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1018.753994][ T4113] ? security_file_ioctl+0x93/0xc0 [ 1018.759132][ T4113] ksys_ioctl+0xab/0xd0 [ 1018.763393][ T4113] __x64_sys_ioctl+0x73/0xb0 [ 1018.768091][ T4113] do_syscall_64+0x103/0x610 [ 1018.772696][ T4113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.779031][ T4113] RIP: 0033:0x458209 [ 1018.783000][ T4113] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1018.802606][ T4113] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1018.811653][ T4113] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 [ 1018.819762][ T4113] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1018.829000][ T4113] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1018.836973][ T4113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 09:08:15 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 1018.844952][ T4113] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 09:08:15 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x357, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x14, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:15 executing program 0: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ftruncate(0xffffffffffffffff, 0x9) r0 = fcntl$dupfd(0xffffffffffffffff, 0x800000000, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000680), 0x0, 0x8) r1 = dup(0xffffffffffffffff) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x6) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="ac48000000000000010000ead707654a3016fe2f2c605e2eab000100e00060ed000044c56e96e86bfde6aa767595d40afb842ea04bc7e7d6f0459c837b6d6c77ec1068f6db75729e76986d6fb3dfa06ab7df580ad5b39a33e2b44b89ad801a5d446022bb5d85450fc56b48470407d740bfab7ed57c3434bfb2d67a5e6631663e139b4b000000000000"], 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstatfs(r2, &(0x7f0000000300)=""/79) syz_emit_ethernet(0x0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:08:15 executing program 5 (fault-call:3 fault-nth:4): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x15, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1019.105531][ T4144] FAULT_INJECTION: forcing a failure. [ 1019.105531][ T4144] name failslab, interval 1, probability 0, space 0, times 0 [ 1019.154578][ T4144] CPU: 0 PID: 4144 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1019.155271][ T4153] validate_nla: 12 callbacks suppressed [ 1019.155280][ T4153] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1019.162517][ T4144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.162525][ T4144] Call Trace: [ 1019.162555][ T4144] dump_stack+0x172/0x1f0 [ 1019.162583][ T4144] should_fail.cold+0xa/0x15 [ 1019.198717][ T4144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1019.204642][ T4144] ? ___might_sleep+0x163/0x280 [ 1019.210482][ T4144] __should_failslab+0x121/0x190 [ 1019.215453][ T4144] should_failslab+0x9/0x14 [ 1019.220071][ T4144] kmem_cache_alloc_trace+0x2d1/0x760 [ 1019.225467][ T4144] ? init_timer_key+0x122/0x370 [ 1019.230324][ T4144] slip_open+0x8ed/0x1138 [ 1019.234654][ T4144] ? sl_uninit+0x20/0x20 [ 1019.238899][ T4144] ? lock_downgrade+0x880/0x880 [ 1019.244203][ T4144] ? sl_uninit+0x20/0x20 [ 1019.248535][ T4144] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1019.253638][ T4144] tty_set_ldisc+0x2d7/0x690 [ 1019.258573][ T4144] tty_ioctl+0xe69/0x14d0 [ 1019.262915][ T4144] ? tty_register_device+0x40/0x40 [ 1019.268992][ T4144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1019.275679][ T4144] ? tomoyo_init_request_info+0x105/0x1d0 [ 1019.281409][ T4144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1019.287734][ T4144] ? tomoyo_path_number_perm+0x263/0x520 [ 1019.293451][ T4144] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1019.299247][ T4144] ? __lockdep_free_key_range+0x120/0x120 [ 1019.305052][ T4144] ? __fget+0x35a/0x550 [ 1019.309302][ T4144] ? tty_register_device+0x40/0x40 [ 1019.314421][ T4144] do_vfs_ioctl+0xd6e/0x1390 [ 1019.319014][ T4144] ? ioctl_preallocate+0x210/0x210 [ 1019.324212][ T4144] ? __fget+0x381/0x550 [ 1019.328456][ T4144] ? ksys_dup3+0x3e0/0x3e0 [ 1019.333059][ T4144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1019.339386][ T4144] ? fput_many+0x12c/0x1a0 [ 1019.343797][ T4144] ? tomoyo_file_ioctl+0x23/0x30 [ 1019.348735][ T4144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1019.354974][ T4144] ? security_file_ioctl+0x93/0xc0 [ 1019.360141][ T4144] ksys_ioctl+0xab/0xd0 [ 1019.364298][ T4144] __x64_sys_ioctl+0x73/0xb0 [ 1019.368929][ T4144] do_syscall_64+0x103/0x610 [ 1019.373673][ T4144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.379751][ T4144] RIP: 0033:0x458209 [ 1019.383812][ T4144] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1019.403665][ T4144] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1019.412159][ T4144] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 [ 1019.420222][ T4144] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1019.428270][ T4144] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1019.436314][ T4144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 [ 1019.444276][ T4144] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 [ 1019.507317][ T4148] loop0: p1 p2 p3 p4 < > 09:08:15 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x12, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3000, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:16 executing program 5 (fault-call:3 fault-nth:5): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:16 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() 09:08:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3100, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1019.840756][ T4167] FAULT_INJECTION: forcing a failure. [ 1019.840756][ T4167] name failslab, interval 1, probability 0, space 0, times 0 [ 1019.896527][ T4167] CPU: 1 PID: 4167 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1019.904474][ T4167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.914554][ T4167] Call Trace: [ 1019.917888][ T4167] dump_stack+0x172/0x1f0 [ 1019.922403][ T4167] should_fail.cold+0xa/0x15 [ 1019.927249][ T4167] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1019.933052][ T4167] ? ___might_sleep+0x163/0x280 [ 1019.937898][ T4167] __should_failslab+0x121/0x190 [ 1019.943105][ T4167] should_failslab+0x9/0x14 [ 1019.947600][ T4167] kmem_cache_alloc_trace+0x2d1/0x760 [ 1019.953052][ T4167] ? init_timer_key+0x122/0x370 [ 1019.957902][ T4167] slip_open+0x933/0x1138 [ 1019.962226][ T4167] ? sl_uninit+0x20/0x20 [ 1019.966453][ T4167] ? lock_downgrade+0x880/0x880 [ 1019.971563][ T4167] ? sl_uninit+0x20/0x20 [ 1019.975807][ T4167] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1019.980904][ T4167] tty_set_ldisc+0x2d7/0x690 [ 1019.985496][ T4167] tty_ioctl+0xe69/0x14d0 [ 1019.989850][ T4167] ? tty_register_device+0x40/0x40 [ 1019.995237][ T4167] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1020.001468][ T4167] ? tomoyo_init_request_info+0x105/0x1d0 [ 1020.007172][ T4167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1020.014007][ T4167] ? tomoyo_path_number_perm+0x263/0x520 [ 1020.019642][ T4167] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1020.025454][ T4167] ? __lockdep_free_key_range+0x120/0x120 [ 1020.031256][ T4167] ? __fget+0x35a/0x550 [ 1020.035406][ T4167] ? tty_register_device+0x40/0x40 [ 1020.040679][ T4167] do_vfs_ioctl+0xd6e/0x1390 [ 1020.045436][ T4167] ? ioctl_preallocate+0x210/0x210 [ 1020.050542][ T4167] ? __fget+0x381/0x550 [ 1020.054692][ T4167] ? ksys_dup3+0x3e0/0x3e0 [ 1020.059103][ T4167] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1020.065557][ T4167] ? fput_many+0x12c/0x1a0 [ 1020.069967][ T4167] ? tomoyo_file_ioctl+0x23/0x30 [ 1020.074891][ T4167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1020.081127][ T4167] ? security_file_ioctl+0x93/0xc0 [ 1020.086326][ T4167] ksys_ioctl+0xab/0xd0 [ 1020.091006][ T4167] __x64_sys_ioctl+0x73/0xb0 [ 1020.095611][ T4167] do_syscall_64+0x103/0x610 [ 1020.100287][ T4167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1020.106689][ T4167] RIP: 0033:0x458209 [ 1020.110574][ T4167] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1020.130265][ T4167] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1020.138667][ T4167] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 09:08:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3200, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1020.146632][ T4167] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1020.154592][ T4167] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1020.162565][ T4167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 [ 1020.170547][ T4167] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 09:08:16 executing program 5 (fault-call:3 fault-nth:6): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:08:16 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x34f}], 0x358, &(0x7f0000c22fa0)=[{&(0x7f0000000200)=""/1, 0x2034afa5}], 0x1, 0x0) 09:08:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x100000000000004a}, 0x80) 09:08:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3300, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1020.338391][ T4190] FAULT_INJECTION: forcing a failure. [ 1020.338391][ T4190] name failslab, interval 1, probability 0, space 0, times 0 [ 1020.417880][ T4190] CPU: 0 PID: 4190 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1020.425838][ T4190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1020.435947][ T4190] Call Trace: [ 1020.439271][ T4190] dump_stack+0x172/0x1f0 [ 1020.443851][ T4190] should_fail.cold+0xa/0x15 [ 1020.448572][ T4190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1020.454536][ T4190] ? ___might_sleep+0x163/0x280 [ 1020.459521][ T4190] __should_failslab+0x121/0x190 09:08:16 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 1020.464506][ T4190] should_failslab+0x9/0x14 [ 1020.469044][ T4190] kmem_cache_alloc_trace+0x2d1/0x760 [ 1020.474458][ T4190] ? init_timer_key+0x122/0x370 [ 1020.479476][ T4190] slip_open+0x933/0x1138 [ 1020.483856][ T4190] ? sl_uninit+0x20/0x20 [ 1020.488132][ T4190] ? lock_downgrade+0x880/0x880 [ 1020.493187][ T4190] ? sl_uninit+0x20/0x20 [ 1020.497470][ T4190] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1020.502614][ T4190] tty_set_ldisc+0x2d7/0x690 [ 1020.507503][ T4190] tty_ioctl+0xe69/0x14d0 [ 1020.511882][ T4190] ? tty_register_device+0x40/0x40 [ 1020.517188][ T4190] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1020.523575][ T4190] ? tomoyo_init_request_info+0x105/0x1d0 [ 1020.529322][ T4190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1020.535567][ T4190] ? tomoyo_path_number_perm+0x263/0x520 [ 1020.541301][ T4190] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1020.547362][ T4190] ? __lockdep_free_key_range+0x120/0x120 [ 1020.553130][ T4190] ? __fget+0x35a/0x550 [ 1020.557321][ T4190] ? tty_register_device+0x40/0x40 [ 1020.562451][ T4190] do_vfs_ioctl+0xd6e/0x1390 [ 1020.567059][ T4190] ? ioctl_preallocate+0x210/0x210 [ 1020.572178][ T4190] ? __fget+0x381/0x550 [ 1020.576335][ T4190] ? ksys_dup3+0x3e0/0x3e0 [ 1020.580782][ T4190] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1020.587142][ T4190] ? fput_many+0x12c/0x1a0 [ 1020.591614][ T4190] ? tomoyo_file_ioctl+0x23/0x30 [ 1020.596578][ T4190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1020.602854][ T4190] ? security_file_ioctl+0x93/0xc0 [ 1020.607990][ T4190] ksys_ioctl+0xab/0xd0 [ 1020.612174][ T4190] __x64_sys_ioctl+0x73/0xb0 09:08:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) modify_ldt$write(0x1, &(0x7f0000000040)={0x6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, 0x5, 0x3f, 0x0, 0x4ae5, 0x1, 0x7}, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x400, 0x6, 0x8000, 0xffffffffffffff80}) [ 1020.616794][ T4190] do_syscall_64+0x103/0x610 [ 1020.621435][ T4190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1020.627342][ T4190] RIP: 0033:0x458209 [ 1020.631263][ T4190] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1020.650895][ T4190] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1020.659308][ T4190] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 09:08:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x13, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 09:08:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3400, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:17 executing program 2: mkdir(0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) syz_open_dev$midi(&(0x7f0000006ec0)='/dev/midi#\x00', 0x99a7, 0x80) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xe760, 0x8004, 0x8, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setxattr$security_smack_entry(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64\x00', &(0x7f0000000340)='/dev/midi#\x00', 0xb, 0x2) getsockname$packet(r0, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1f, 0x0, 0x0, 0xd}, 0x98) geteuid() [ 1020.659316][ T4190] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1020.659323][ T4190] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1020.659330][ T4190] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 [ 1020.659338][ T4190] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 [ 1020.704901][ T4211] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:17 executing program 5 (fault-call:3 fault-nth:7): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x6f0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x29f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 1020.766584][ T4211] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:08:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3500, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x3600, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 09:08:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200002, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x88, r1, 0x304, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb1f}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fff}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x31, 0x14}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) r2 = socket$inet(0x10, 0x3, 0xc) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) sendmsg$xdp(r2, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000340)="396c8fae682e0b90e39419df2be442a63c53707dfa8e0e8fa70b69901abe5b036df845c2133cea9bb745e28e4f200f7903a84050afd9720b4644fdc832854f1374489d67b18464faba3b2f9f849440df5c39ff873dce3897c1c771145d15f2dd342340454ce162895736606015c2cbba950a8bd5212598a5b39b0e3dc92707b5d1357cc132bd49d913d2f4de504ed506ea43d991f4ae2e94c382badd824a02be2b49e214377e4c872c8fc42429333e2afc8eb27e43bb9aaab66606c456e0ba16b15a8bd9ab5d3cb18fa290056b5a463a13a0811e1623be4c6cc242d2d6e1bbaef941a0", 0xe3}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="a1484bf182ff0e9d53d120ada0a08e1785c3f90793fa71b84ea1f89fc8ecb56d8227b6994aecc1bb28a9dc251d70b3f198f479c8d7b1b507bd138d043d890820bc6455717596a65c3675d499f33cd4e8cd90fd8f6dbbccadf5b76bbc58411ed4836d886cda0bd0e894e00fd68de7a12c5507a1eca2988aec0e742ceb34c10b0378b8b781e0e2517bfd28bbf2cbad9ff9b4250700cbd2d910a53f923f0cad53f1ed9a080eed73a84aed925a1762d3ac5c55e47d92786b2602faeafde2f7080596e8fe0908f2ad4cf4646138f6dc7079ee71536e792b18412b0c85be340c68a9a16ce11e68aa3a85f651996e188a5277a81020ca6e3d581a22", 0xf8}, {&(0x7f0000001540)="7a3d959e94ad9f819354d9fcc4e7ff83f8123edaa80ff657c284e2302fb2648c8d10f9e96d0776fb5319ad8578a2ecf6198674d5234c549f2dff0914b37a7c66f56927", 0x43}, {&(0x7f00000015c0)="0b8e0921782703b86e22deb3b932882efa77c844055907f7b82bec8120b61f9812f14d592bea046ef303951b3d4f38c64710ad49026712ca0dd0d7ba8166d9ab482b5b56624731b62d157d8470800fcc2f8aee1e13aa331fb93669df1b1b97b2ff66133cdb3e6a05b83c83143e84311dc2bec40474ecedc98340fde3558af9bb1dd719353bc4ff000d117a8cf9c8804642e06456e687d1a6a7b351c65fdcf857141c4f4591bafb35ab5275f528a062e82f429100678db5563c0b8994b3d44906620d3a1bd3f3cc768b1159eb7ee4946da25297a7e56320f68c812e3898aae46d390a415390f6f32e26350cde6ec630014ad03bcf491af6a6f7544c7ebba8", 0xfe}, {&(0x7f00000016c0)="6ad9d759ec621bb88be57d4c3cb37e380f52004592f63c2978d5b9f9b1d3d079ecfac852a3add91865cc8d10373ce392198447cbe438a56792cc81d0aad15f7ce05a990abd90bba632ed476d73fece2510020c0b6a0545443253068d913c7421a0ff84c56fe0a9f45329a6b303e827af8fd3ce098834", 0x76}, {&(0x7f0000001740)="95c43312089fa62e98cfd55c81ced85acde48482e0015d0979b2c027d3732cf9463c97fd4138fec4c046a76184f961997eff6558911e5e15e8221ea15f3bc7ea5f2348198efdf13d3004a8b17b48b1546d5c410f292e83f585a541d6edb6736d0862f114cc9377ab4545f3d9c7822f825d9fb186", 0x74}], 0x7, 0x0, 0x0, 0x40850}, 0x4000010) [ 1020.874400][ T4223] FAULT_INJECTION: forcing a failure. [ 1020.874400][ T4223] name failslab, interval 1, probability 0, space 0, times 0 [ 1020.926476][ T4223] CPU: 1 PID: 4223 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1020.934448][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1020.944523][ T4223] Call Trace: [ 1020.947862][ T4223] dump_stack+0x172/0x1f0 [ 1020.952244][ T4223] should_fail.cold+0xa/0x15 [ 1020.956882][ T4223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1020.962743][ T4223] ? ___might_sleep+0x163/0x280 [ 1020.967657][ T4223] __should_failslab+0x121/0x190 [ 1020.972646][ T4223] should_failslab+0x9/0x14 [ 1020.977178][ T4223] kmem_cache_alloc_trace+0x2d1/0x760 [ 1020.982587][ T4223] ? slip_open+0x976/0x1138 [ 1020.987125][ T4223] ? rcu_read_lock_sched_held+0x110/0x130 [ 1020.992880][ T4223] ? kmem_cache_alloc_trace+0x354/0x760 [ 1020.998493][ T4223] slhc_init+0xa2/0x52a [ 1021.002704][ T4223] slip_open+0x99a/0x1138 [ 1021.007150][ T4223] ? sl_uninit+0x20/0x20 [ 1021.011422][ T4223] ? lock_downgrade+0x880/0x880 [ 1021.016306][ T4223] ? sl_uninit+0x20/0x20 [ 1021.020619][ T4223] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1021.025872][ T4223] tty_set_ldisc+0x2d7/0x690 [ 1021.030545][ T4223] tty_ioctl+0xe69/0x14d0 [ 1021.034932][ T4223] ? tty_register_device+0x40/0x40 [ 1021.040149][ T4223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1021.043902][ T4234] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1021.046409][ T4223] ? tomoyo_init_request_info+0x105/0x1d0 [ 1021.046430][ T4223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1021.046444][ T4223] ? tomoyo_path_number_perm+0x263/0x520 [ 1021.046463][ T4223] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1021.046480][ T4223] ? __lockdep_free_key_range+0x120/0x120 [ 1021.046509][ T4223] ? __fget+0x35a/0x550 [ 1021.046534][ T4223] ? tty_register_device+0x40/0x40 [ 1021.046556][ T4223] do_vfs_ioctl+0xd6e/0x1390 [ 1021.046576][ T4223] ? ioctl_preallocate+0x210/0x210 [ 1021.046587][ T4223] ? __fget+0x381/0x550 [ 1021.046612][ T4223] ? ksys_dup3+0x3e0/0x3e0 [ 1021.068505][ T4234] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1021.072374][ T4223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1021.072392][ T4223] ? fput_many+0x12c/0x1a0 [ 1021.072417][ T4223] ? tomoyo_file_ioctl+0x23/0x30 [ 1021.072433][ T4223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1021.072451][ T4223] ? security_file_ioctl+0x93/0xc0 [ 1021.072472][ T4223] ksys_ioctl+0xab/0xd0 [ 1021.072488][ T4223] __x64_sys_ioctl+0x73/0xb0 [ 1021.072516][ T4223] do_syscall_64+0x103/0x610 [ 1021.124848][ T3876] kobject: 'loop0' (00000000f928333e): kobject_uevent_env [ 1021.126622][ T4223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.131029][ T3876] kobject: 'loop0' (00000000f928333e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1021.137059][ T4223] RIP: 0033:0x458209 [ 1021.137074][ T4223] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1021.137080][ T4223] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1021.137093][ T4223] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 [ 1021.137100][ T4223] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1021.137107][ T4223] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1021.137115][ T4223] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 [ 1021.137122][ T4223] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 [ 1021.141809][ T4223] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 1021.265613][ T4223] #PF error: [normal kernel read fault] [ 1021.271165][ T4223] PGD 8874067 P4D 8874067 PUD 8876067 PMD 0 [ 1021.277158][ T4223] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1021.282432][ T4223] CPU: 1 PID: 4223 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 1021.290316][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1021.300676][ T4223] RIP: 0010:slhc_free+0x31/0xb0 [ 1021.305708][ T4223] Code: 54 49 89 fc e8 b0 b3 1c fd 4d 85 e4 74 77 e8 a6 b3 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 81 b3 1c fd 4c 89 ef e8 19 75 54 fd [ 1021.325418][ T4223] RSP: 0018:ffff888051d879e8 EFLAGS: 00010246 [ 1021.331486][ T4223] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc9001087c000 [ 1021.339450][ T4223] RDX: 1ffffffffffffffe RSI: ffffffff8453bbea RDI: fffffffffffffff4 [ 1021.347430][ T4223] RBP: ffff888051d879f8 R08: ffff888095826000 R09: ffff8880958268f0 [ 1021.355412][ T4223] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 1021.363395][ T4223] R13: ffff88804f78d240 R14: 00000000ffffff97 R15: ffff88809e3ead00 [ 1021.371365][ T4223] FS: 00007f4d6388d700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1021.380284][ T4223] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1021.386968][ T4223] CR2: fffffffffffffff4 CR3: 000000009f5c0000 CR4: 00000000001406e0 [ 1021.395115][ T4223] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1021.403084][ T4223] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1021.411158][ T4223] Call Trace: [ 1021.414465][ T4223] slip_open+0xe16/0x1138 [ 1021.418805][ T4223] ? sl_uninit+0x20/0x20 [ 1021.423054][ T4223] ? lock_downgrade+0x880/0x880 [ 1021.427907][ T4223] ? sl_uninit+0x20/0x20 [ 1021.432143][ T4223] tty_ldisc_open.isra.0+0x8b/0xe0 [ 1021.437256][ T4223] tty_set_ldisc+0x2d7/0x690 [ 1021.441847][ T4223] tty_ioctl+0xe69/0x14d0 [ 1021.446181][ T4223] ? tty_register_device+0x40/0x40 [ 1021.451320][ T4223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1021.457569][ T4223] ? tomoyo_init_request_info+0x105/0x1d0 [ 1021.463291][ T4223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1021.469532][ T4223] ? tomoyo_path_number_perm+0x263/0x520 [ 1021.475164][ T4223] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1021.480966][ T4223] ? __lockdep_free_key_range+0x120/0x120 [ 1021.486696][ T4223] ? __fget+0x35a/0x550 [ 1021.490887][ T4223] ? tty_register_device+0x40/0x40 [ 1021.496019][ T4223] do_vfs_ioctl+0xd6e/0x1390 [ 1021.501966][ T4223] ? ioctl_preallocate+0x210/0x210 [ 1021.507114][ T4223] ? __fget+0x381/0x550 [ 1021.511297][ T4223] ? ksys_dup3+0x3e0/0x3e0 [ 1021.515725][ T4223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1021.522093][ T4223] ? fput_many+0x12c/0x1a0 [ 1021.526534][ T4223] ? tomoyo_file_ioctl+0x23/0x30 [ 1021.531481][ T4223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1021.537725][ T4223] ? security_file_ioctl+0x93/0xc0 [ 1021.542859][ T4223] ksys_ioctl+0xab/0xd0 [ 1021.547024][ T4223] __x64_sys_ioctl+0x73/0xb0 [ 1021.551632][ T4223] do_syscall_64+0x103/0x610 [ 1021.556218][ T4223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.562098][ T4223] RIP: 0033:0x458209 [ 1021.566104][ T4223] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1021.585814][ T4223] RSP: 002b:00007f4d6388cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1021.594237][ T4223] RAX: ffffffffffffffda RBX: 00007f4d6388cc90 RCX: 0000000000458209 [ 1021.602214][ T4223] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 1021.610376][ T4223] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1021.618457][ T4223] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6388d6d4 [ 1021.626431][ T4223] R13: 00000000004c2472 R14: 00000000004d4e10 R15: 0000000000000004 [ 1021.634421][ T4223] Modules linked in: [ 1021.638346][ T4223] CR2: fffffffffffffff4 [ 1021.642510][ T4223] ---[ end trace 56abe272e52c52b3 ]--- [ 1021.647972][ T4223] RIP: 0010:slhc_free+0x31/0xb0 [ 1021.653012][ T4223] Code: 54 49 89 fc e8 b0 b3 1c fd 4d 85 e4 74 77 e8 a6 b3 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 81 b3 1c fd 4c 89 ef e8 19 75 54 fd [ 1021.672985][ T4223] RSP: 0018:ffff888051d879e8 EFLAGS: 00010246 [ 1021.679149][ T4223] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc9001087c000 [ 1021.687145][ T4223] RDX: 1ffffffffffffffe RSI: ffffffff8453bbea RDI: fffffffffffffff4 [ 1021.695145][ T4223] RBP: ffff888051d879f8 R08: ffff888095826000 R09: ffff8880958268f0 [ 1021.703227][ T4223] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 1021.711193][ T4223] R13: ffff88804f78d240 R14: 00000000ffffff97 R15: ffff88809e3ead00 [ 1021.719219][ T4223] FS: 00007f4d6388d700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1021.728743][ T4223] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1021.735349][ T4223] CR2: fffffffffffffff4 CR3: 000000009f5c0000 CR4: 00000000001406e0 [ 1021.743344][ T4223] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1021.751322][ T4223] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1021.759285][ T4223] Kernel panic - not syncing: Fatal exception [ 1021.766391][ T4223] Kernel Offset: disabled [ 1021.770844][ T4223] Rebooting in 86400 seconds..