, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x0, @ipv4=@multicast2}]}]}, 0x20}}, 0x4004820) 06:59:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x0, @ipv4=@multicast2}]}]}, 0x20}}, 0x4004820) [ 198.312017][ T8929] device bridge_slave_1 left promiscuous mode [ 198.335490][ T8929] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.388437][ T8929] device bridge_slave_0 left promiscuous mode [ 198.404596][ T8929] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.215254][ T8929] device hsr_slave_0 left promiscuous mode [ 201.254876][ T8929] device hsr_slave_1 left promiscuous mode [ 201.330196][ T8929] team0 (unregistering): Port device team_slave_1 removed [ 201.343006][ T8929] team0 (unregistering): Port device team_slave_0 removed [ 201.357868][ T8929] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 201.391764][ T8929] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 201.485232][ T8929] bond0 (unregistering): Released all slaves [ 201.656283][ T9542] IPVS: ftp: loaded support on port[0] = 21 [ 201.777878][ T9542] chnl_net:caif_netlink_parms(): no params data found [ 201.836647][ T9542] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.843834][ T9542] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.858428][ T9542] device bridge_slave_0 entered promiscuous mode [ 201.870285][ T9542] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.880617][ T9542] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.891973][ T9542] device bridge_slave_1 entered promiscuous mode [ 201.925435][ T9542] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.937254][ T9542] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.961177][ T9542] team0: Port device team_slave_0 added [ 201.969132][ T9542] team0: Port device team_slave_1 added [ 202.037595][ T9542] device hsr_slave_0 entered promiscuous mode [ 202.074904][ T9542] device hsr_slave_1 entered promiscuous mode [ 202.114516][ T9542] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.142147][ T9542] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.149319][ T9542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.156793][ T9542] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.163875][ T9542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.243182][ T9542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.272864][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.289061][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.301315][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.327868][ T9542] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.345338][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.361768][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.368913][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.404164][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.413578][ T3644] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.420731][ T3644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.452034][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.463805][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.488012][ T9542] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 202.506027][ T9542] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.525202][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.533164][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.549528][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.575634][ T9542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.583698][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 06:59:08 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$rfkill(r2, &(0x7f0000000100)={0x0, 0x0, 0x3}, 0x8) 06:59:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xf0ffffffffffff}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 06:59:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x0, @ipv4=@multicast2}]}]}, 0x20}}, 0x4004820) 06:59:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:08 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b0f02000040dc", 0xff0f}], 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x800}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000100)={r4}) 06:59:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 202.820683][ C1] net_ratelimit: 7 callbacks suppressed [ 202.820700][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:08 executing program 2: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) 06:59:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xf0ffffffffffff}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 202.875264][ T9560] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 06:59:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 203.017399][ T9560] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop5 [ 203.036477][ T9579] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 06:59:08 executing program 2: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) 06:59:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="a87855"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 203.203371][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, 0xffffffffffffffff, 0x0, 0x2}}, 0x20) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) r1 = socket(0x10, 0x802, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007180)=[{{&(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0) 06:59:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xf0ffffffffffff}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 06:59:09 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) 06:59:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:09 executing program 2: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) [ 203.493141][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x100000000014, 0x4, 0x8, 0xffffffffffff3b64}, 0x2c) r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f00000002c0)={{0x3, @default}, [@null, @netrom, @remote, @default, @null, @default, @rose, @netrom]}, &(0x7f0000000340)=0x48, 0x80000) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000380)=0x100, 0x4) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nfc_llcp(r1, &(0x7f0000002f00)={&(0x7f0000000a40)={0x27, 0x1, 0x2, 0x7, 0x8, 0x28, "758c20c3081ef4ca8a2075b72a5a9fc579ebb719246082604f542b7827a4aa52d578f6703ed3b6042f23f15f0d4b6e55bcf5727abe39d4d6c2bd586a8a8971", 0x3c}, 0x60, &(0x7f0000002e80)=[{&(0x7f0000000ac0)="4703ad5aa9e7a6f19b76e1ff29a0e016420f7cdea2bd99a79b9e7ac0cc2a629286c7600227a908a8fbe30cb846de5f5aba8dc53326b521ef276b37527ba7307077d4ed6f95a5b61b5ca064e23df6487194df94f3a0640b2ee5a67832d8a037726ade97c7a846126cb45b6d42124c1cc7a6d416ce7e5b3f7302f36636dc5a7180f7176a22dac5e166026a1549acdbc8cdf4deba48e9961ae3018e20d875bb9f59420e76fcd95b", 0xa6}, {&(0x7f0000000b80)="b6f3b6a23c465db91d8c0261ac3a4389bb0003466f5b6a4ab7aef4a88d91e04b56445b8506ea50769647c91b5f6c57dd5d50542601893eac11c5a0532db9e88ae8bdb989fc7106aa615554520c", 0xffffffffffffff66}, {&(0x7f0000000c00)="a83ed1835472299b28980597be8ab44653e98f44ad2baeb1143b0f37554f3e5f45577bc18ae15fdb5467815e990b6f04d58aeada0c677c661d535f3b67be4b2463604e44342b83a95c17f028c43f3fad949ad0736db4a19da9ffd240bad1925c2a0f489820c71ca1ff8210f85cf37782040f4aa285055b2b309572895f8b8118a75aabd63226fa1c26656d652a6eb82ff01b8a02c4990553527c0b90281d424370c974bc0e23ca7e50a5c85c4af87419589818e9095874e2f33f81a7671689978f20696191adc622a98e", 0xca}, {&(0x7f0000000d00)="30ef6705a0ac972aa6c1c0575937651ce966b9aee78e56adc0250dfb7a595c4015ee40693c7f5ff8d9c0a097247fc6cd869b548efe68c080b63c1a8e4be51a101334a6e354e88959c1bbcef353515d0c4baa774f72dd59cfcea166db6edbd4b041075884a5dadc11df0dd803f811d3341201df42a840ee0a3059dc7368c1b4f75d30c5e29c342406f284ee34e58952e14e596875df5448cb13fca44b04a9b9e7ac6c093e2938e87937092b1ede25cd91048f15fdc5db7404178b238c32bc1c92078664255fa08a358de187e25a8b23861a962366429632333511d940c111b047447ae3a852076a0580b7aa1344452d6879dd1a918a70b9217cc25279bae7c8b9d3cbe404d133b67e59539b39770d6b748332e3cd3c7c0709ab9ed92b7a33fd4782ebd0cff793691e7ab404c74364f07624177d6042b13afe521bcf1793feda3753d4524745a1a406dd6f5aa691ad9154549cefa6e69a57e5c30b727ce8fcdeefed9601bcaaf7e3431f4437aea5893b41081e64a9d9ccdb664f8b1e9da34c3f8d1c9cea9cfc313c5f10dbba31c7bbcd828427d803b4208997308dad86397c48dd9594ad51042302747ac510e05b3bff09260bb160baebc3cad8135e929f3dbfd8010964a0e89fe8dc817da876eb6d24dadd2be9c574a4d4b5b9373d9ed2825062c5c82bbd37b604e6d5d2bbd91201cb82daa1a5f2f0ea28312121b72c243ca220dffce22adc2cf5bf7da8f2e7ec4446533bec723fb0a865dd78757900a6dc37da2cb322fe583e41a10efef055370b5c1b8ac55b9a43b4a18de9f904a990a0afe9eb3d6f15792cbb9373350f0e983a66f0c0ea6473b1a73252cc0018e9b5c5bdc244bba18f537ec5fea78462cbb44e18c856a744e94b01a5a3692d40b20802c9512f4888a12838c4b426f022431c6a19c628712be805bdb2f39c2a690617e2cce1b72b0b2dec3e794a52fe8001d8978993880de41f2e5ef2d015e0a17ebc30eb40107e90563a96fca2d8b01756a47371d1dae14b0ce0d6a919355df11138a065810ba30e86fa99abc73aa86b232825649ebc2e3d0a127f8118e2791ebf82cce977eee3dfcf2bd863603b4d409552f1cda6b0f5f9a80651310d4ba03425a408d64edaa012d2df3adef3be0057d38cc9635270501a65948a7276b3e83fb166e852a0956d6eada2aeb92145930d48efbd0828c705cffa86334d3855c5afcaf560f439bba5ef35a668258ba5683990f6203941f52788de0c5b87709c80afddffb1959bb426763c7cb52020576df58317f879ee68ada9cb53633717d0f507b641f7a16d9b7bb87089aac49063f7d0fab3a937207da7d1f2c744233d56c47a69fdb786772a89ca8e1712a212154c8f4608f771f35f7527692216fd4c2df74ebba3e4008e6ec57e483e1d36baf4f08fb9cc0623eaa9e3a6c2a68330db54e82fa4a07003fa33697f422e14f3fcddf35a79fa81d60f839f439abaeea33c7399e0e0d311cacfaf1495e147ef2db28af3162092c8e3b47ac4668677b4f0972afc9f2a56dc2b281a9c0e511c987047496fc151b3326a2c413a605e98cadfdb43fcc0318591dee824a930ac267bf2cae048ad9b0e3cb430262ee49fdd0b459e011f68df6d2efb66f51826e11c4dfc966f8dd5e7e85bcc20600fc1baf11e42091a5c178523c7e1642cd8c223f70ff6aa4de003a0f1a7e76157ffee6a18bcfc91907be086bf716c7bdc1f3725708d42cac2b9902fb7157fdc1e6f731590bdb50b3f55ff9749d249a13ce71750a2e7cb233c503a6a25bdaa29ff99ae8306f111d3e45df6a69b99e7da15b411930120ce82d9d5e9073b29048b071789aea020e408dd7e7216a9e6c2e68d14f67e30b7907bed8bf0845444e2a5b0fb2176b8f10863107c054fc1f84aee57884a601f227b2b40961fc750ba7be75757a720d09eb153c1672e441e9caa5810210a8b37fb2b1b288492132353388edd1e5136fe57883d6b146d51a4e58b8ed13900c3d9bbff049f58f3f4a9d0806bb70f7eba6b8fc3b07eae3f3ccf3afc628dcebd6368ab40879d27a506422cefa869fcd3485645474c70fcaaf901e6e1a306463494d33d47a1f9c90cd7a7f9b361a365fd4380f8fedf4a729690e04db0330395acefcab0dd0d7834d8168fc2c0b24ee6b26ab3daff9c1844077b61c72a46a4b80a382dca8174cab558aa50d3b96482e7a6d8d7245d2547543ee6bec1a02f15d2a6a1c14232f9556cc57a0e1bda215cb57e19942e03be723b46946854d3516a2f446094eeacfc539f35d255e4e3f3d2fe4bf1e44ffecf136f3bbf3853b5af51d799d534c49a8e461be129c5f4ab2ef854bbc57ada379fb408646524ed22e7a3730099252b0a1331823500198799055237bf7877ca532a003e8349d1d4f99b08c5609a53dcd60c1f3f00f26f39673e9ded2d552e478783845d592a98211514529aa8f9c4491027941d98b836b51708d1ebe612a018dc48c061a97a06a260a879c9461a917d8e6d6c20597fecad6d1143c54f9e0d0db9f76a90b9fcdd7126ec8a1109aa79aa844c7c1ce4f82349288245922322f4295b11f0ab3b181bbc4f9583b90d176619ef1fded883f5fc3d9ebf9f88e7375e774e724e55030e4d57bc1608730520015f51400faca66b51137ed2ea18b24a52a5c2905a4a46d16b3cbff9a8e3914c12b2d2d8a4fc7776e93cdebcc7da853af619cd770db9318a1087db3942eed2ec7c0a56252aa58db8aa0793d3e3c5eab88b2e8f1a9037d1f6f86475f08e9d97df9af2f594c01f06d3044dbc51f3b0e63138042f97744e831f8f1992785fa77964515963af0716707c7dd0aff333a4d0a6514d877b3c026e3c9dc143e841d2aec0ce9f1c7ca1b355524b870e17b7f784b1a9542d0c1cac5c28b9e810fbe00029b74a4d95571f1096fc29cd1a90e95e5a60f0c1f6f5482616e5df05ec2fc97a27f6603ccb55dbfc83e311ce1df2fa80fc8d0f64f93a9175686442ad71a1544b77b2e73b85c7a6276c93d00e090bfcbbdeb9fb00fb6a84162807327c59238bf550e014d3198c46b2f496a425a141e04fbc687170d7192ce2e235388a6cf38e6e7b477d291323e3d3333fa5eaa938eec108671a80c9c9607039f60d7d58fe0227257ea7372ae3bac50926dbdc5847efd98f7c2f99c20804fbdf3e27b9fc0d288d851af6d39376b3557749133b488acc1b6cf33f89f817b86c7c956aa0b85366333df6d25c61b9fd710288c337c79620014a268a22c91cba25fd2627452216dd1891d78d80614d4c1d9ecb622127ade90d5657ffd1d119b5783a2f1d3ee26d2a91571fa900e88b12e0de4c9af60dbe1baf8cc70e3d848cb684778a85727697bb409a8d0b9ed2665aebf45412b0beb466a3ea85c0a033ef5760244a05f7fb941d06665863804c7787690f4c505bff9fb6ae17450a70e5093881cb1053f3ba24fbee6622826090b6f1b0d8df73d7490b7c76a5dabecb9b6278e7e181976201b1acf4e209c66cc1d97506db8b0a8c504316b471772469c8852e009774629bd5002a8026a12f017166047b72c87b0576c4e8adc77c34c34aa02fe5e087d1ee748b799e08e9fe96ae23bd4524269dfd739c1851ebc9246276f1f0ce68fbec38275533b8e0e5197fb6893cc0f80273e39615c6c349cadcbd18d69bcf3c2ee5f49986556272a8b16281d93026f4b8ffcd311511fb38a96d317c258d801c7c0edede4e90c96f5b662bb926400cd6c211938a2e8e3ff244e238aaee12b714ae3d22ab9fb58f5b34d356f852ffee5d4e182087e4f2786656195a75959e9d4eee513d8bc819dda47781d5c5c006bb64ddde71e6b5a5f77b76867b9a222b5a151a8ce5789d57f4298c154392428ae57bb28fa06efe6d8aaedd09c2d646ef9e0e0e0763afdc386795864b3df60e3822973c9903ddb650e6e99812071a9d49e7b1aa52e7f9053264f544a547e62e74632586727a27634c81062269c85f0e93f63c31a4f6fb76c33ecf92014f4530b7f9f544d7447f172fc3340f7edb87ba851bff20bb70f1bea24cde3f9d7033cb2b121950692d7f66a2c155b231aa7a3a45acbb5e58b82098484ff20a05ceea79969008dfb3d575fe4fdbf0f97d2f48734b3e33fd0734aa674620177fc44486f70cb08376cf64d094ad0ce75a06a56fadcb3a1d7b8cfa8db2754a97105701e687767ceae9e45efba677a6a4b3b406627c447d46ea4f5508a2f64085871558e1f50d1fae27ca4b9adf414179e92d4933e9a3ae2f80aa8a348c04d4e2115d563a5dafffeb5f690703658b50ac9ff630472e900332ea305428d8a4b7086bf8a2bd0c4e21c624819bf3757cd83eb30f40a95f1556e5bce8732cd3572e8bcd8e2ba1d5156f8246bdf539122b35b5f4fcc9d573314e6e57dfac45a99755656310ef428c36f7e37b253235da6c6ac81203e71163b00b9aea3eddb8f905aaab5448dfcd378069d2585ccc5439e93418176d7cbfdb48ff8cf518db2aa9b730c0097934b985344440a6e19d4a712a90eaf43cdc1a21c748df686b69eb25f61fb499bd877ea0d3c0f21c48be109eaeaef30541d327730893f8f9c8c3ad8c70e7010adf6e2ca2881b3f577ed98396e2e88468c0bf47f3ac21ceec4a76ea4f6f9c764d3f259c33d700fc47a0316e27046a2bfc6cd3ecd8fbfded3c9cf5cf1c4330c72e74bcf14eeaf5e1115b160acdd0202e8fe693c5e966633c530afa394a69a56554f7a28333449108745c5771995d050b958f65719174237d8aaa6dd1727ac0bb0131f2d70d96c88a085bbd62959080ed776a2b8d8b74e7a236621f37673e61ae6e59e91685c7d5910d646640057a0bcc141ca7ee612ebc9b774e57421777b9c71967b2ad76d53d44643a97f2596ceb3f3fe500ef3ea03464fc17d35bedbe09cf886470a84533e0984896ebcf8ee64cd2e64337c1c44c8e1e4bd5695659eda0b9f9d32c4dbd041072accf3dc2fd6760e07f3a28e278e0bb19478b2941c9b6f96848ac46b753a42f989d511a0a975c56f77cf2afd2676df57c89422ee4e4719c7a82fe525a6255e6e7d29b979b47c3e8e37c34d73935cb30df306664b8000d55a743e8c889d209158b069ea4da7b8be38f929e2a8b26e27411b3ff91e3756e401769eccac220905f82e791add35cc2275fb23279216811c9b3ba5d8495074d98ebe61a2838dcac3b0c23d15595b3407d14beaf03492cdbac917a809039983306d85b3fbd7d03d0b002596c886a6d4c2dadc3e23c26dec5449524107f4189afd14f502e278d253584af8a2e4cadc757871bd26f75d45851cecad7264fe4d53891a01ac5116e412d1fe77b1829a3408d05b72676930895bd90068b87fae6792d276a5ab4f3ad16bd2162fae4d69b6c5aa1eea524c6677e9c839803073c3f01b711efb404714fa5276012c54752cc929265a1bc5625c662f54edfaf9548240c2ec5f2c3eb6079c1500b885e0aeafa9ae992bd670330bc35f4d701d57c88f449180131cfb83a5d6327dfbbb2e56db9e8e0993c843cd8a3be1e7e9b1edc60c9178c8a55d46e23c80b5df2da0ed1675266277b28d27adf119e40e98e161e0b9ffe59a5d10b6032368ebde420eed1f22a979e3e9b68c0b14ef1274d3aacc73efae42d082edfb5ba4abca64f4cf0e17315d10a9d49b97cbcb3020cd7ba12a966b4eb2806f574bc86fa9b2ee2db2f3d66545ee005a6bdc2b4729cfec99636d35b411af9541f1ed82309ddd201f44022795452656c66505ba3324d4b221d7ace40c3597529295216cd0c9b5e35cc2eeed7ca264d89f733ebc6359b3446ace72e9eabba", 0x1000}, {&(0x7f0000001d00)="74e9a3e3ca7368faafec58458b6c0f442debcdd95a7d6a5314874bb4b19451da6aadba8360658c7553ef8720509f0f7d237e8ba2cb58a368fee0c9522a845b1c3ad6963af8a5055037b677a78dff700789aba758943c3d234173896860bcce", 0x5f}, {&(0x7f0000001d80)="03b21ab3cbef2dbaf8862be2e8386f36ec591902cf971f80b56898d7b6a7873283d1df50a934cb5a9a9bbd0b8dba6059d7235c85590aa975777b636af68363e1b498603d18fb8c683f1af5693dc4a47806b2d547c05d5cc076ff8765b861e67a3fb8424c012303be3dc98e47a718025bfe01cf21672505c064030324b4bd9577e8c867d2faac4cc77b071be190fc99c8ea255e69290cf27ed3ac03", 0x9b}, {&(0x7f0000001e40)="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", 0x1000}, {&(0x7f0000002e40)="a41a3728c8e141fea31295003fb7038c503783ac586f7d7d0f999127c6c9501fe3", 0x21}], 0x1000000000000090, 0x0, 0x0, 0x8040}, 0x80) r2 = socket$inet(0x2, 0x3, 0x3) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000940)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x2, 0x9}, &(0x7f0000002f40)=0x90) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000002f80)={r3, 0x2}, 0x8) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f00000001c0)=""/244, &(0x7f0000000140)=0xf4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000880)='memory.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f00000008c0), &(0x7f0000000900)=0x4) socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet(0x10, 0x2000000000000002, 0x0) r6 = socket$netlink(0x10, 0x3, 0x9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r8 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x20004044, &(0x7f0000000040)={0xa, 0x4e22, 0x6, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r6, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000003080)=ANY=[@ANYBLOB="2577f67efda58690d71ada5bfedc94d8688ca5f371e434a44b5fd9c367a91343230a94e369e2aa461549bf102b1f869be582db21cc3cdf98fdb26795113fa9e98a5cdfb465d678ff7dcf748214167ebf0da9c91ead7262db02d54fc355c8db4ee83facd61c6ea9d28e886408902ca3bdc91da0cb7d618d3673486807b5fef21121c1137a8b10eb73b32861e3695834b7d64079122724302e899ac6d20ded5d25f801bd8634f2b71e5df9ce06942e3244087a43dbac50b5a801344ec98c2afd7a1ccf7af628eb6135acb5438138b6580240050d5cf06e0e96b7e2d4cf299ea5248a04d1f542b9222be48b0188dbe97873b16f2dfd390afb285be07188cab8a815857e7af9c59dd51f3cedd442fda91bf22f49675be13cf5b27e92da57b11d162ffa585cd5a537168a0d13c780fe5e5718e5983ccc927ab804adae17e53bc8be0aa319ef6b9f993ff971b60f09b07389cac3e37c14150594e945a7dec96f331e69076f3862c9f74c83de8ddf449de2df5564a420ff232249f5f1d912e7be170b7d434e2b984d8f7b934bfb07b63e20c87e70cccc18b9acac9da1613b1c79626b856ae16c8c20fcc4a31104e75fc33a95884f130411f6d3e26b6ce06596570f6ece80a659454135d13ce583ce522df56fbe98f36e6f917d7e59dc297b9bd920eb79eb4ca81c9cf55c0e07b03314f9c9e1aac653f56f4eff6c89dfccbc10ee839fde42a6f13563032ad50f333984ca2d911239d45a040419b10a0fad04c31230b0d7dbd93a816cf5811842111488ee881df00a72e991e5dd809a83f51ab501b2f3976207e365c15bbf6feb2a6ffa0b61d5683a8e4e0b7adf638e1028d954638654af41ba627ab99c966b041f03dda5040c87f5ac63a946fd9b98e3b85046eeb026035ff9888ae2cd695e3eb0e93e0644b2f0ff1f70f7d52d287846b29018f6e70a53db4f8032ee32ac296d15e35033f821792e340019fe82d7c77861c73d279f897dc8fcea20809fa671f4d1e8f6c3fbcc38eb2172d6a6ce6c45854d8a84512006907fac6ef97f7df132813d0ce4f30ed8c2ba655ecf40cd24e6a8cd82400257eed9ac84d92962061eca82add2503f21c8a75885819d8519ac2c095efdc5aec8a7aee2b4cb82f0664f5ebf532e3d7a6a33f0dde8362af07b8c38fa17e13d2794ada8f4db672c4a07096525857df69e7a26a40790041d70bd841b4f5db33ab2b3765be6b48814a84fffa07be56ad7fe7e7883f8a81643b7af4f14fedf76b4fbbc3306df528209e05d88a9abaa394fa545c80c9b9bc51a059ad1160d56962506c54f5609ef8a0f9115269a2f55bc418c80b2cd3758639637821bf1d14cde5384526128e96696c9114b05b55458a5641f07f4ee22e8fc0d42c994974a06b8a60dcf78108616babf662161b7418c04c8a5199f775d4bc428a62c1a9293bd5a86475e9343a327f17fcb057135ea902c467b97e03eedb096cffd44718aaae8442a5fadf0484eb2cac2d2575692afd8b02aba1e8640a150235d006fbf2b883bee085d66e41f3d8604d3204c8a93e82e2bda07083f74fcea4ab62bb790e931e1956c7a3d58684bf8c568219b92944f88e27d6744c6b02f40b98d2e5a5a0e4d7fa97d07ae56535d3329823938c891261268653d19ad3e78c9e367e661f70c9fc6603a0298dc2b137e018776c50abd417d51a186dc2d89e458fb05eff4a337c208a91fc7e02ff38799d21d32ceee2011d429845890d957d54c10ddc7ade4e86ea49e9315460a54e7aa73dedaab28d3473445bfebbfc07830f70e90ec8f99a76ad2a5fab0af6d7ac6dd7db25a535587a7770e8d7e68d8c277a341f001a2cce996b2cd54e60515a83bd7d0166fa3b5655b92de08252ce5db6ac08871913e9cdbe03a5d024ac1af05ec1049a3daf1a141689420e21636289f849c5545a0443332616a6f2d31f6e2ebf8d613acbc498113970432d48e42e5b0eecc954b81cdc79cf24c4e90450ef3a864fbc3a9f37db81a627bbc23e83b9f333b945e19fec570c2a8074f8ff9eac1a219e0f52e6ef0c61d911dbcfeb5283de3bb189c7144fae0591bf5b70455fd37143e6d6ca355ee941e1c2ddfa79e3f64279c9ddc8acc81e2ecff888924418c97b9a95855f03a4f579093a7f444d8de52a6f0adc57878acc2352ade5a4b853a16c967ba069fa51329c9fd2713317a637da4d22a73b534754427d386cb92dfdf91c1290d6c533c075820413c17ed5cdbf3379137e413e0043a006c1438ecd89e3d6cf22580ef92f3f6dd68e403031cea380c50b038f0d0f58334ffc31a6740a979ccc6761b214b117a1dc38db1eac51235cf9b8fa511f12dd42bfbdc2e92827e8b3362b98f68a2d75f7775a37709afcc4e94f88858c318b3a8405550831a89cc5adcb940677e66885958f1d4e25798385ebe8c649621e6ffd9f7ff2689373c0d9188db8080bd0cd78e30e2fd731e491bad6755f7fb9bfeaffde29ec5aae756f493c25ac52016c2941309fe68edc63deecb10838dbf3c51325bf656f3e2f6ddb5096624f2343b3d826a03b37c7fe127b3c4fa2262c0f594494aecd1a746db12a956053da547a583229656fbfd0b2423b937660e39ea330021efc7c5e0d02c33662fdae20415bfbe09d78235b1d324ab98166d6300b56c7e2c9a61af0ddeb4b38964feeace639243257c2bab0d5099d0196cf06f07671cc417fb11d090e297f0daba70a76ca615b4a7922fbedae454bf6759f5f4eb2a20a63fb33fb2d2a5c2ca5ed13aa5422c33b5b9f511d575329a50b16cdf790f8508c39abbbac36002144d7a235794a011536a671271fb32fb177922be7f5571cb028bd473807c318eb92c3cc3126218a1ee18b6ca5f5d5be89223f627ce56b9df1edb3357bc114ef7e7b0ff90e4f178bc2e2d174fec1313f2971e1a98c57ec16478361edc85f96a80d4de5fc702688f0615e429686619b14fe51a77d1f2a31a2f1427660f96df85224cb0bb73e0be642a258357b1836eba25a90a850c2087a77d8e6c813f02608ffc585ec1617e286aa05b80a8f59888c33f5917302d36295d839708884d50b2779f307961db95fedc5aa3231c383d4de77e3e72e3124ba88c7f8619eea8fe44f7c6bcf3fcd44c1b74dbbd139d1d1b24b6d6c1ac026b21ebdd32fc2839eef4d4f0dd7344ca7e32569430d01a3eb87e48744bc726834abfe639b103803e930e4d2ac47d9504562039e5d96edaeb4ce923f33a3d857bd1bc9abbdbbaa2c1f71fb0e176725f7ed3e10ebe3846a7348c4990f3a58f1f0fbd1c498799a22e070f4f139d4a2ea5b0a37445ff7e714fc44ebf836c88caef8cc61cfa632a04c5e10b062cc399a5d9ad392cb8c330f2a93a6f0dfecd4b603a7bcbf66e7ea17c57df4e087751b0025e14ec3113bce2bb11d685f27edf70240b22bc84e1e85f34a4ca94c73fcf9e52026e356bdc710307ba9ede484ebd9bc3eab0c7e9cfe9105bc513e3fe1e1e14b1a5a2bef450bd4b3d90f171ddaf181b72550a6a384dd0e159e9aeffcd28026a894b100155f04e6f7521a5659a01258aad8db0baed3abdb0f4e81550880f2a0b3ca2e0f3f12b8c4f65aa126e51e9327e84e5effa4a0c630680ad8d2bffbcc9b5049c56b676fec6ee917397d2cd95e37bc624cb5e4cf094c6fbe062ef4faa9307f30a436651bc5bda040941780b810fb5c3516330f9e511010a46c345cbf11125b506b39e28349b5242bb8f4069621556bd9c017c90e598e20c2501f6805cf6b4fc60ca60bc6f2aadce94a7cc611b69e9cf1df7d96af3773418d9ee5c7e5cffb44e83d3252513e8fe435d0c31ad798eb4b9c9d461d8860b852a6dc935bdce70094b7e5e91864ef90e94b3769752b843c71f37b2c2469bce4cb8bfcff3d16dac717a34b68892a2ed2b6102df478790685b82b978472ab274e677fd6ff51711a156030e6846b9ca9561d41121529e708d697e1fb42c9b7daa1268545211b349b0ef7280ba3c15bee7201a1ecaa84fb5928b61070778a15330c216ca628ba7be7257bf90a2feb4e02165e03a98e137c4f55a2e7655024c8b6d5e5b439d4fc635468d4bc8a78469dfbf80dbf593ac69be2b4faa30d76f38e31055f404b3aff04ad887b53b6fe38b4f1dde8941b24a87740185d40c1de7aa4409ccdcd6a3f7dfff66988e7fc16b1f6a71e984dd28aedfeae5c9a4db49ef1f883decc42568135e7112348e660300199cb7fe2f65dcd7338b1ad044c74955ff05ef756673017e0ea46945253423e3d5027e895d8e44c172b1ddd17d9df13b6a7b0122d02b96a786572eba5ef1efe4249bb67ba116dcb844d5ac6440b3d65215a2dbf126e7f42071bc853e0e20dea97d59c9e8a259c530c1cb6423447ceaf289e69f410ac91d98d152201bd672085c68f0c3a6e4bc2ffc8ccd481fe4704b90387191164ef68a21f062cf31fd0f6a462ed8dad3086eb1ee39f8b4ca733bc2f190cce63f2e69209268327430eb00e64e6efed2a2c98bd68144d4c69eab8099bcd31f1519bfec3001f51a7cf59017726fa3051f0ed61d4fae78efb42ae9f1afba51316c7b2f4822f39ff10f9acf58797224bbda80a85465d17573c7cfd08fe394e6b17fc324305c5d33293f17310f2806c52ab3be0a0d3f639a778d38621c0d8ed64d3796634cebc21d71662c5450c2164e52794580dc5d4420150ce7843252c86a2f21e1e86b4b9986b4dff8e39f455ca00fb16fa49c7e47d9b483a476c0e325454ca581a7724c979d6e3cde57fb057d9477120043ea10a52839aea3d54fba320edcd63ba353b2460e2e234b2d4db6045bced36527704928917ecb4d51b23c05c4d8eb43275b7f6437e9e7264b2d77d8af77ed005df9117048fbbdd638f27888a19fc1e96c2b167e3fb72b862f4e7f4d9cf585f65457cd67c5ea75aa6ce51abffb11637a51736d15e4bf7c00f29075199a10b14871c2f48bb2cb40b9cba7c7b1563510ce845b03561c4dfb7d0b40726ee303900804d67be3d135af13234ff6d34acef78f94ad051f62000f1cb823882df94836bc738bfacbad033a0a079e40e29f8c3f3e6ae8f0bbb533499a4e87336c64222d5146c5427f25a08523c02df44462908517e2a51b8dec42faa8d99aa4b927c3d60310ec33be497b3fb97b49366ff89699e22cd99197fc57f30d94c533decec55777517f0bf61cbb9264ff039fcca736bff94d1c90bae516bdd96e305bb95f8dc18e9ced8c41309c0c2ba2361f00be4fb9f7ca7a91e2c269169349404ee0786545a5a59b28a34b87d60ff67bdeb7bf2e0bd3ecde78bec9951c72b9d62c4898d6e46ce80362a60d9889ef3bb58106e58050dfb191555dbe26fb2bbab2f536b028d7da5a5bdd482ae3eca6fea5fc468df91d4ff534d870fe4d2a402b96be9ad869ddcdade45c7d0e172af90e68ded95e65c46504967f99bdbc9d0a628011659d790ce792d0ba652f7c031a2a311b191de4e55182a32276a864b7b633e933b96f154f8f252208b5047a7a5dc5e6287b075f5a3950fcaf5130afa7930a3e6084c271dc19bf8a1db1ac093f773fe78d9e0ef0a63fe29d1991aafbb47603446040db59a56396cc64696f68bb339a5155a006050f6900e98429af6c7b6427a7b3b478d04ffce2da1fb91b700cece303735dbd4fa0e9f857e237d16fd3045dad8039869293334336070a3c94e36e24f5dcf121841a0cc868679a8ff5bed51cb28e317ed281add8c2029d587cfd331e323a97d57111440670d91cff56691bf47df3993c13ef71a7c39c9d5b73f897264555baac3ce32e411af9403d8b181d89848178e9", @ANYRES16=r5, @ANYRESDEC=r7, @ANYRES32=r8, @ANYPTR=&(0x7f00000050c0)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESHEX], @ANYBLOB="54d5e9dd2e377c8c8698a83aaff931db2d04a131554777c3bed3576050466ad7e749c29df2b06a7e0df77f5a8039c9f52c3032be79fb823543f73549bcdcc8d4e73d5676dd46aa9039f8818115b28eb55803f0b525dce2eebd49373db8a80fb3d140ea598a55a46278af2f540adbda6aa179f3e33a95cb2aa1c9e57432507a24d9c5c9a06740072ec15fdc861f77f2ec8e0c6a803fd9fb3dfe4d96fe73313277d6309148e02a8637cbbd5e362fa1ec751a74a7dee2f74e81a40e1dc8fe6e114a52392136196f3c7a1176b9fd30ce8413161bcad9f1ed6c9a51865286bbab4f9887e1b5b3ede678d0be1fae6297bf5b77b989b2839e9dbe519fb682abd5d021c5eb03903dc3165b491874406018fe6b4acba88fe779a2f2151ad001ff88d63e97cfba9e0c5f4dd3e348bf55f8cec5a43877bdb103ed431a5fd692449a19512e929e0b041a64c5a93267162986cbadcee8ab5d3bc5ca728bcb44ee4225e4c507e9d078ee7e331ec31b7c2e58c45062c53ec854d0fee694295724ca3ada0470ce4d6cca2facbcc3ec133571bebe228df674a58dbf8c5f230fb6104a1683cb84bbcbd730cbb0b18a8007171cdfa33ae478e69f7aafc5cb5ef4fd0b0658c519ee9ecf60fbb536c340f1556284d6c4ab508651fbe20f5bbd7b400528e9e0146253874386300a463444ed016334300dcf5a9f1d827dc214d1fa66e559569dd350d8e72b312b8c25660cde65478287ebb0a5621375076e075095332c7c6541ffbecddc49d83ade533e62bdbaaa720573384474285058f85d16df89a08b22bcecbb98d5d3fa243dd454824c34778790473949458c37d74bd2518bc23072e606d7d1ff1823be953a6afd47ff1163ed28f11f15a035ee71aa43c6abe282efd38fa80bbb39ad888af2c3af5113374ea324ba13ce65fb7d9f88a9a83ff92f0b6bbb7a9aea62ddb2fc049cd30ab348ae91cc2c355a3914cfc7e5f18d94783d504e5a984c4a9849268ad43a1a6fc16dad3b5a63a0f4593f4953deefcb8e6a931e48f8091525755f17c583769bc4a902650470ff8b553f164ff1b04a203082eb4ffa33a43e02d1764e13c6a23f573132a2b88dcc743d4e019fd8096e1cb48e8373654b8659c1f0b44c973d87768c0f44a2366271cd42e1f364a314cf40aafc0e41fcf9c01f88ddfb0a050ce5438eaf48bf398454ab17108e5caca7db7213d4eceafa3266185b0e3190c7150fe8acd5daa4b2471fd53c4ae3cc4d7cb40cef5c19e165ecb0c85dac70ef8c7d0990998f2b4145cb5d6db0f4b06a398ddf06cab1eac9933e3d0c4160030682baed6e5171604634f1862868d20e3beec1cf0f5ed5f737f0b7b0f13c43098cbe46191050b0f46ca913abfa1188609df789bbce44c7e537e7155ed36f41c50a78009bb2b8a2a005dd061a970b991aecd651e299aa7aba4c7b873b84472016461aa162d4a03899082f9e6d89b6e971f0fed8910134553d38fb7da6bb130daefc540fcdaf0e0af1074a2af6d7df13eb965cf2fb03b791372e834bc5c4558667236fea49142eac60437109c81bbfa65f78cd1adddfaa74099e5d0cd52c924241b9e9d10ee850791b6f72e6e20c7a6e8439fece65a51cd95240e6b205edb185221eaba0bb16c9aa068ce7d825f53c86fdc9e7e994e81a391a4dfe3287f64283eed5a70ee26253fe29725adb778752ce97db52540b783181e4474d0cc385408c90a37658be160e7039e55fe2d7c69271317b36010cc5f3d39fc8fb511e6734be10eb8fba380de27c16895ca2282c396abf649321a8daabe8ad0bc057a004f9e94c16f17325ed4df2284c19a7bd96bd5cf0dd2c0c2ff64cde89e863c8eab821ff10fbc538f301c2a10378935e1e9a14525601db43db5c1aa2293900543f1b4c3f2ab11ad28dbfadb9f73c9e83d61a046bd558d4b90a7a971afc5b761548cbed35f5723e70593411dc17c12b2a81127a94e11ac258eec377d4ed80baf93fa4fc2fbb1b778645f1b4617b88a2588048cea5eac6327be16613d8eb0386a8f7add2389103d5cd2d229862f954d152dd9e06d0e09a7d8380f5363fe823a4c0f3d396835e5ef0613db74e0b26978e6ce1ffcf2458de202a64ae7228529ed110aa34730261bef94092a5541e14e59358bfcf5be4294a786fc102becd45a9c79aaf6a8d3d71411e8090fa4c0c2ee2fd467f09d708243ad8c08284c245291804c999fadac7e9ae24461c80a7414a32fb0ec2fc40829d0784810638c9a8d9ea8df2328ddcd95ccf0276f693febaa706401aeb4bb5672c0003fc6c3739670673c4da071e3b1ab2f0fa368daab230232cf9e49efeb45e26f34bd0718d8a4f15123fd2e5941f289136299007fdcd68db37abb0d11fb7e8c6170d7289fd83ec8fffd4681dd5ce36c85ab07c8f0f13741b5c0d4ec3b65431b05e1eb2add796a1015660a67e70e0488ac96c8b6bd16e52af5b0987cc6e421abc5d2d56075a91a04b0c49945a9385f242037edb412e5879b53976f606e7bb70cb49a88d29acdf6f6b12171b4e02524abad1585ad21500e73f9f843f2101392418c3962af9c27b30537beec0ccbf9668ab9a9396d690f4fb2a89fadb902b6c0c4320b0300b0f53460a46831a76f6bb506d2dc2bd8ee9b4df31358db61f6bf89b3ef0f1ab51a27babc5675de11fe534017e1d7328eab92a62b31f1b8171c47b2cf8defc292dda883b1986f4e39cc0fec45aeb2b3ed1342f8dc7a8715e6df9e7762a6c7a04ec219ff7a2db8ceacc1e5fe199e0ea9a3137b77b282e82ab832140a48e9d13baf6272a0fcf91725519b1eb49a4efce77e7beb4ae632d80e2b8f904c2634d215b4ee2a55cd36955492cc99dfd3533e37348bbbb0d29ee65c9dd283870b9757e60425506447c3be26da4d91f4c73a016d6b0c10ed8c33d64f4b955d333e53754d8500854e90be45f7812b78597830925d4e147cda2c8e2e8cfc09ce4ef46ccc5f84448b8479afb9aa50f032ecdca3d6042d5602e672c9e9e43e9d1dbe49ae69d83c04cb7f988f9cf3c21aca869dd5d7082a59daea98ec3aeddeaf7ee583c56ddf6adadfe547ab7e9b47b4b8c64da1c2519a9d41cd36d1495b7e0dc429bccde6c32779adc0978559aa4eb4ad344452de37098eadc46fde2f6783582858be29ddd56d26b9ebeeeec0989c9bf3cf39588d4a165a8584d3bc9761154cd0f113cefbf4005710ec9c0a3ff6576d82295f88cdd29581c4b80947e1a2669e3b2641543a66d70cca84b0cfd57829fac5f01ca69f10e7055ca22a08a89a624f80bd0aa9153c4ae47630f2e24e3e3659a9e5dfc51c2bfa9bf5b0345156c2ce654d241f5b05f2c2e73e819af12764263458e26f2c5a806269dc16d8110f2a08dcb73f91673cb89efb5cf997a43b9ed453c1c95b5f2416f98c034f6990d38f13d5ad0c12d74876a4421ce02257c837a9d816099f3cfedb486a2a928dd759379e0e757d0848b4d3129fc1b2619f12f0bad9b2db0c98e9cfa1b2b7a0e3e060bb910e3e6123437d834131396a2ae5bc3165d6a8403a955c5c710fdcd52dd096e7b4e44eb34d292b2017cede471d330ac12d152926afd672e917435ffd57232016d5f5e4e4d027291ca4bf713ed5c2069e644c8c54b4400ded7a42847d17a8ea8dba4e050ed9ede24e7369a649ab413e0a3571042afbf79093a8362f5c63caf069cdd695c01aa1eac11a24e1b2e6d9a5e98f584520775d924a7e8ea80120814dc546b9bb5489c7125ea5c2de13ea9637e977aad17e79a2d497b4bfe8d92d7df387242187001cd09cb9178edaa3fdbf9854ba8c2f254cb524869b212c397e40d4c43168170a666b8c732fc3fe94324781ba37d0eb5220de5cd2391576447c5b83519dd897fc79667125c47d32502070e422d65b94dc36fa5b97dd1c1bd24655c38ae0d4bc2c059864b73740e51480ac7bee9c6daa9c651f7ab5cd699c1528669e78cef14ee5e496a99a52c503e782a0cd6edb733a2937ae5e329b5273d10d053989e69c954a7e92157b04243e635bd8417729be0d3e576728089908ee7a0632a24347167227e9f7fb90fac912cb66a3c157d7400ff548d8847052dedcfafad87c0c87ba7e8684a1b46947390358c0f60977b00ca9d80b18e80953f265082c93209a390857dc279edf2f7c3ae0dbcb6bbc39d0de0756c538fc97551d4f1ef5447256ca07b04e7052a7f76dc9a2c73a95b50af89a5a8636c0ebfeecfbead6a531719a96ef008cb96d86ebdd860f1de8b7ea57a56f91f34bad8d6ab1d7bc9be1040ff8087367a7a38f70ffe9ea0c4e2a1e8d6d5306de5b690473bd2151e372ebe9e419fd11eaa2d519f28d459f2c0da44b67595271cc4b8ece565b5d0a65e7d7e36c6e6d19e45d7cb5219f73d4bc9ec6c9469f609edcdfdfdaee967ad1096c33f2cff66b78615a5772974fd7674ffbbd00f3df68603d11fe6cd102d45ac669ee86baa75dbc24d01c71f5292fc40db2cd0166e049141f32d6829f3ebbcbb61b01ab83b3b5b50b83b5ed575b62fa3c00495a9d661b3d2353d3c8227755ab9744a6bbd57a00769e1208b00a16bc46d025f8ab3e01bf1f2827ac029d267605cac348785afbc4b3fed44d591f81b1cb1fd56ced2ae935686d8a2f9df54babb65f3c8bdc3f1e892c6fbec3e866a4f99c7bba5b7968ba843798b45cd8060c1106237a8f0ed2bed57a0144c6e57793711fe615ba7d941bead8641b8121fc2b92bbd3a859279cf521ea7e45b1fff41ac88f6a9658cc0642ca01e61b57c84d0ebb9fa702e48a4427742ccad278448215e76fe58a18bfd15c641604d679d23854b9638c78625b79c2c0b74621a8a7f723d7e832491abbf5862a87e56c7e7ab4907ba3a51ab7f69b5d7cee5e8dc4fbfd9362ea2f01f34322bd61b2f362eaede5e06451744232fbadd47c8d550d4bcf592d406866fde87813acca006be6fa8d305ce59941db0e64a7b5cc2da5bcd9607be46f896e8bc951f01af86e8bf9fd2562737426c33c689d7753e19d348518fecd71768c921aa838060fec908334f7c07fbbb238ab70feddd032c23486190704cf73d5c3dd5e003419db592ff03805a2d4648f6bf69b573c082afafb652d79081dc9a1a1d9cc50438f3254c3edc9f33f6aa5f2852b4b9a68c41eb631a9999ac8b836e8b7ddd12161f7a72e528823d6ebf1b377cad2d163fcc9ce6e5eb8e9e06c5f7de3e57120b3c9a4cc448d02c4f00ef3542e3dd01a2c872a62a00ed55211a00a286538326bd3fe95fbec49ce2e58b38278746c566304b3498e25d31d5ae5822dbd57b44d314336cb1634b9af536a1cd23d7806d25584a32f6168eee08858ffa66020f34c0edc6554f0c9db607c3f689f27a0259460375d05a5d003f241d74480d57db0371c96f5f3928104e1085d3b76131d0dd148d67db216767ab29be4f1e72bf2826ea41c3cdf8f41ea6c221b943b4579a08715d66b3fde9f48044d812534962faf31537872153d83587584cb7e53b97000ee55988f52086ec482b1a259d454326e3f86c5031348465ee60661a0d4d94d1c325ce00420cd113f974f095e7f72d35de09d4f0808a4a6d27a4a1bdc87f239c78dca5840bed6b6c2d2b4c4e429cbe398c438e632c9e464862a3d1a6eaec5b81c3b16e628261a18a72c3662ead979d869e66f22d61fbd943aa9872d1dd6e720d42caf8ccd098bcd8adb580b6140aa15ba4ffd117a3949e94e5b5f030d802203c61df40567b2c1ef285935783d0bf211df2797b35a0a7768c376ed2fcd34e526f2027a0844ca702fe6122cd7a668c68b840bb9b0ea2a7c26e251ad192", @ANYRES16, @ANYRESDEC, @ANYRES32=r3], 0x9}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000010) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_RCVMTU(r9, 0x112, 0xd, &(0x7f0000000740)=0x13c, &(0x7f0000000780)=0x2) r10 = socket(0x4, 0x3, 0x8000) ioctl$SIOCX25SSUBSCRIP(r10, 0x89e1, &(0x7f0000000500)={'veth0\x00', 0xff, 0x10001}) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_buf(r11, 0x0, 0x9, &(0x7f00000003c0)=""/101, &(0x7f0000000440)=0x65) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x18, 0x4, &(0x7f0000003040)=ANY=[@ANYBLOB="180000000000000000000000000000001444239093ffad97d600d901100000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r10, 0x29, 0x2a, &(0x7f00000007c0)={0x9, {{0xa, 0x4e24, 0x7f, @dev={0xfe, 0x80, [], 0x28}, 0x101}}}, 0x88) r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f00000004c0)={0x2, &(0x7f0000000480)=[{0x8, 0x6, 0x5, 0x9}, {0x40, 0xffff, 0x6fa1, 0x5}]}, 0x10) connect$inet(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130001000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) 06:59:09 executing program 4: [ 203.712705][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:09 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:09 executing program 1: [ 204.017559][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 204.151281][ T9595] debugfs: Directory '9595-4' with parent 'kvm' already present! 06:59:10 executing program 5: 06:59:10 executing program 4: 06:59:10 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:10 executing program 3: 06:59:10 executing program 1: 06:59:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:10 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 204.396510][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:10 executing program 4: gettid() getpid() sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) timer_create(0x0, 0x0, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(0x0, 0x0, &(0x7f0000000140)="e8", 0x1, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) keyctl$update(0x2, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:59:10 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$rfkill(r2, &(0x7f0000000100)={0x0, 0x0, 0x3}, 0x8) 06:59:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @broadcast}, {0x0, @random="0f000000388d"}, 0x0, {0x2, 0x0, @remote}, 'bridge0\x00'}) 06:59:10 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 204.621691][ T9666] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:10 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000), 0x2) ioctl$RTC_WIE_ON(r1, 0x700f) 06:59:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:10 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0xe, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000c, 0x10, r1, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000280)=@req3={0x0, 0x0, 0x3f, 0x4, 0x8, 0x1f, 0x6}, 0xffffffffffffffc0) r2 = socket$netlink(0x10, 0x3, 0x0) geteuid() getgroups(0x1, &(0x7f00000001c0)=[0xee01]) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x7) mlock(&(0x7f0000ff5000/0xb000)=nil, 0xb000) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01400040", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={r6, @in6={{0xa, 0x4e23, 0x9, @remote, 0x1}}, 0xfffffffb, 0x1ff, 0x8, 0x0, 0x80}, &(0x7f0000000200)=0x98) mount$bpf(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='bpf\x00', 0x800000, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) prctl$PR_SVE_GET_VL(0x33, 0x8198) epoll_create(0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) [ 204.791134][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) [ 205.047173][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 205.289445][ T9700] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 06:59:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:11 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) [ 205.427204][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080), 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:11 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 205.520859][ T9713] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:11 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0xe, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000c, 0x10, r1, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000280)=@req3={0x0, 0x0, 0x3f, 0x4, 0x8, 0x1f, 0x6}, 0xffffffffffffffc0) r2 = socket$netlink(0x10, 0x3, 0x0) geteuid() getgroups(0x1, &(0x7f00000001c0)=[0xee01]) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x7) mlock(&(0x7f0000ff5000/0xb000)=nil, 0xb000) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01400040", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={r6, @in6={{0xa, 0x4e23, 0x9, @remote, 0x1}}, 0xfffffffb, 0x1ff, 0x8, 0x0, 0x80}, &(0x7f0000000200)=0x98) mount$bpf(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='bpf\x00', 0x800000, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) prctl$PR_SVE_GET_VL(0x33, 0x8198) epoll_create(0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) 06:59:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:11 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) [ 205.692370][ T9723] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 205.715674][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:12 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080), 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:12 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:12 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0xe, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000c, 0x10, r1, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000280)=@req3={0x0, 0x0, 0x3f, 0x4, 0x8, 0x1f, 0x6}, 0xffffffffffffffc0) r2 = socket$netlink(0x10, 0x3, 0x0) geteuid() getgroups(0x1, &(0x7f00000001c0)=[0xee01]) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x7) mlock(&(0x7f0000ff5000/0xb000)=nil, 0xb000) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01400040", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={r6, @in6={{0xa, 0x4e23, 0x9, @remote, 0x1}}, 0xfffffffb, 0x1ff, 0x8, 0x0, 0x80}, &(0x7f0000000200)=0x98) mount$bpf(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='bpf\x00', 0x800000, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) prctl$PR_SVE_GET_VL(0x33, 0x8198) epoll_create(0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) [ 206.295110][ T9737] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:12 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080), 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:12 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) [ 206.616896][ T9760] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 207.060760][ T9749] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:13 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 207.263506][ T9773] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 207.559634][ T9786] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 208.485832][ T148] device bridge_slave_1 left promiscuous mode [ 208.492293][ T148] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.555322][ T148] device bridge_slave_0 left promiscuous mode [ 208.561580][ T148] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.430920][ T148] bond1 (unregistering): Released all slaves [ 210.485210][ T148] device hsr_slave_0 left promiscuous mode [ 210.524668][ T148] device hsr_slave_1 left promiscuous mode [ 210.578535][ T148] team0 (unregistering): Port device team_slave_1 removed [ 210.593261][ T148] team0 (unregistering): Port device team_slave_0 removed [ 210.605827][ T148] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 210.671762][ T148] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 210.752754][ T148] bond0 (unregistering): Released all slaves [ 210.852923][ T9791] IPVS: ftp: loaded support on port[0] = 21 [ 210.941548][ T9791] chnl_net:caif_netlink_parms(): no params data found [ 210.977855][ T9791] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.986000][ T9791] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.993735][ T9791] device bridge_slave_0 entered promiscuous mode [ 211.002450][ T9791] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.009751][ T9791] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.018888][ T9791] device bridge_slave_1 entered promiscuous mode [ 211.039520][ T9791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.050744][ T9791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.071655][ T9791] team0: Port device team_slave_0 added [ 211.079121][ T9791] team0: Port device team_slave_1 added [ 211.208742][ T9791] device hsr_slave_0 entered promiscuous mode [ 211.241481][ T9791] device hsr_slave_1 entered promiscuous mode [ 211.304504][ T9791] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.334205][ T9791] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.341429][ T9791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.349173][ T9791] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.356285][ T9791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.433071][ T9791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.459550][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.476046][ T8902] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.491496][ T8902] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.506731][ T9791] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.529494][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.546862][ T8902] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.554213][ T8902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.580282][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.597803][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.605490][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.645106][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.661432][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.672544][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.693213][ T9791] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 211.713601][ T9791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.722478][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.738816][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.763301][ T9791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.100824][ T9802] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 06:59:18 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000080)) creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c784512634c060cfb6b72c3c922835d2b5f"], 0x2c) close(r4) fallocate(r3, 0x0, 0x40000, 0x4) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xd000000, r3, 0x0, 0x8}) 06:59:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x4004820) 06:59:18 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 212.407019][ T9807] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x4004820) 06:59:18 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 212.669080][ T9825] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:18 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x97a0c, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0xa0080, 0x0) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffffffffffee7) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 06:59:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x4004820) 06:59:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:18 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 213.167152][ T9840] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4004820) 06:59:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000), 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) 06:59:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:19 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4004820) [ 213.498973][ T9863] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000), 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 213.719333][ T9873] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4004820) 06:59:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000), 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4004820) [ 214.022586][ T9889] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 215.455956][ T148] device bridge_slave_1 left promiscuous mode [ 215.462420][ T148] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.525667][ T148] device bridge_slave_0 left promiscuous mode [ 215.531991][ T148] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.465056][ T148] device hsr_slave_0 left promiscuous mode [ 217.524830][ T148] device hsr_slave_1 left promiscuous mode [ 217.575346][ T148] team0 (unregistering): Port device team_slave_1 removed [ 217.589271][ T148] team0 (unregistering): Port device team_slave_0 removed [ 217.601813][ T148] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 217.659336][ T148] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 217.750612][ T148] bond0 (unregistering): Released all slaves [ 217.876110][ T9899] IPVS: ftp: loaded support on port[0] = 21 [ 217.962867][ T9899] chnl_net:caif_netlink_parms(): no params data found [ 218.080848][ T9899] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.088132][ T9899] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.102955][ T9899] device bridge_slave_0 entered promiscuous mode [ 218.112065][ T9899] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.119969][ T9899] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.128501][ T9899] device bridge_slave_1 entered promiscuous mode [ 218.159316][ T9899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.178158][ T9899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.209892][ T9899] team0: Port device team_slave_0 added [ 218.218437][ T9899] team0: Port device team_slave_1 added [ 218.277465][ T9899] device hsr_slave_0 entered promiscuous mode [ 218.314891][ T9899] device hsr_slave_1 entered promiscuous mode [ 218.354493][ T9899] debugfs: Directory 'hsr0' with parent '/' already present! [ 218.381810][ T9899] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.388970][ T9899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.396413][ T9899] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.403475][ T9899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.487466][ T9899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.512066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.527917][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.540696][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.563752][ T9899] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.584978][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.593458][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.600568][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.633707][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.643929][ T3644] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.651066][ T3644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.681780][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.693365][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.717893][ T9899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.738020][ T9899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.758148][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.772505][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.782869][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.810943][ T9899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.830435][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.988753][ T26] audit: type=1800 audit(1569740364.810:32): pid=9907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16698 res=0 [ 219.012999][ T26] audit: type=1804 audit(1569740364.810:33): pid=9907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir747103777/syzkaller.XsGVwn/0/file0" dev="sda1" ino=16698 res=1 06:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4004820) 06:59:25 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:25 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffa, 0x4002011, r1, 0x3) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000280)='./file0\x00', 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) keyctl$get_persistent(0x16, r6, 0xfffffffffffffffa) write(r4, &(0x7f0000000340), 0x10000014c) r7 = perf_event_open(&(0x7f0000000040)={0x1000000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000001940)=[{&(0x7f0000000480)="f03758eda199bd865663bdca536a36483463946ce711c560f42f481fb5c1b88ef750bffcd4245af2ca49fe49a342fa31f42448996afed6463f6d4ddfdb32b6a144a5516f438b410ffb0ba52d852881cfc5ecd75f56979e4647b7b743cca79967f295c45098de3426564487e09c57d1366f43d2c9998c66dbacfb780631d37e704f1ffcf8df2d67fef0", 0x89}, {&(0x7f0000000540)="11c983ef47f7afe947d187e35d401b290adcd00ba147dcd585587147a9a77690033533c133476487ad33e6ec1086e373d50c41656d0d7884f26d26a32506bb2e67f8f355c8365fd14e5f6366fff16c98beaf4aeb99185b918203b7b96db4950ab9e4d0737c935fa3d3ec2441db3d5257d03615", 0x73}, {&(0x7f00000005c0)="51c65c2155ab67ad2f9052ffe3083f8ae400de6d889a6cb37dc45e49a3d25be3362c706448902c0b6c45075264b6117eb25325eb80a614b89375ec5a2c09eddaa3cb74030ca041708de5483414547502ef85383164608dba0538d49c52a515e2def7c5e0ae5fe119fa64ed28485067574a1834f98bca7d4a14770bde4abd94384295b5ba44ab7acfa38e9cf4202726a2f9ae6c3341855cc814cf3d7940", 0x9d}, {&(0x7f0000000240)="fe375c6986a59c5c1422034dd038887d428b761bc9deaa24a5a6a6c3d0b43e6c135fef6b3b9b16faae3b77", 0x2b}, {&(0x7f0000000680)="f6ca65a084da7b71b5d01ac2ff08593c899cab02d80c2bb59b5e3bf3d5db9291b5bc3e1b747ce0e0339b", 0x2a}, {&(0x7f00000007c0)="04b26557dc2bf5526e2ddbb64f436853e9bbd34214b14dbbccdec60f10a66b3f752bc3a0cff0961d7d7ef058be565478eb379c6de1c9d9db32954583be5e652df597ce5399f668899d3e93e9ec812bafcda1427d17300459cdafb10e19ecb3a7ecbd048bcdef901ef5b7bac44b8558a20be58608aa4fc6088b41a38f2a39af26a6b640a026531e3d8feb56147c93b8ba06103ee2dcd2ac938b018319c7ae7fc0529664cd77113c39ad433d9102f69af8be480593798b55cefbb0ce5c54a0e1c99cb4c2ce4ccedb", 0xc7}, {&(0x7f00000008c0)="2023310442fe78f93ff71135aceb5546e8968e01e00ef50bbd4af3c344cdecd96be8a6432b8c83f7a1333986f2d360f088f5b78845cfa6e734d99291c474e6c38a87", 0x42}, {&(0x7f0000000940)="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", 0x1000}], 0x8, 0x8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCRTMSG(r8, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x4e21, @local}, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @remote}, 0x28, 0x0, 0x0, 0x0, 0x6f, &(0x7f0000000200)='bcsf0\x00', 0x3, 0x10001, 0xdef3}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, 0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f00000001c0)) mincore(&(0x7f00000f5000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/174) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) 06:59:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 219.493425][ T9917] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4004820) 06:59:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 219.820848][ T9939] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x0, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 220.081866][ T9951] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:26 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x0, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000000)={0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000140)={0xa00000, 0x0, 0x1, [], &(0x7f0000000100)={0x0, 0x3, [], @p_u16=&(0x7f0000000080)=0x5}}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0x3736dcd18eab2916, 0x0, 0x0, 0xffffffffffffff37) [ 220.481407][ T9970] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) 06:59:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x0, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x11, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, 0x0, 0x0) 06:59:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x0, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) [ 220.738170][ T9989] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:27 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) 06:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, 0x0, 0x0) 06:59:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x12, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x0, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) [ 221.222322][T10004] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, 0x0, 0x0) 06:59:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x13, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x0, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) [ 221.480864][T10022] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, 0x0, 0x0) 06:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 221.550608][T10028] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 06:59:27 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x0, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, 0x0, 0x0) 06:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0xa17c6e44a764cc69, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000001c0)=@gcm_256={{0x304}, "96f03706548a6d3b", "e2a549af345c409e345b52fbaca28e6dafd984297381f797d0feee04e342f5e0", "e86fbf1a", "c20c7cddb53b396c"}, 0x38) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x62, 0x0, 0x0, 0x0) r4 = semget$private(0x0, 0x20000000102, 0x0) semop(r4, &(0x7f0000000140)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r4, &(0x7f0000000080)=[{0x0, 0xffffffff}], 0x1) semtimedop(r4, &(0x7f0000000300)=[{0x0, 0xff71}, {}], 0x2, &(0x7f0000000340)) semop(r4, &(0x7f00000002c0)=[{0x2, 0x8001}, {0x0, 0x7, 0x800}, {0x1, 0x7f, 0x800}, {0x1, 0x4, 0x400}, {0x1, 0x6a, 0x2800}], 0x5) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000500)={&(0x7f0000fea000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440)="b17474acb556dce7b07b06d29f3f2e1005cb06321ef00f675de1833801970a5f601c5084bef75832e207081ada6224cb452cd853db29921b276a17f3eabd7e349b4eaec6d37201ac1582b204a07fab9438b61344afe4edad309664ea5616d697206b436bcc28d56aae2f3346d888f22f29219da81a24a7056a0586aec1ef727ad9bdddd4d3bfdd946a19b1ebcb5ef45d62bf69", 0x93}, 0x68) select(0x40, &(0x7f0000000080)={0x6, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000200)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r6 = fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) ioctl$TCGETS2(r6, 0x802c542a, &(0x7f0000000000)) connect$inet(r5, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000400), 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f0000000380)={0x7, 0x64, 0x6}) [ 222.109946][T10048] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, 0x0, 0x0) 06:59:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x0, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:28 executing program 2 (fault-call:4 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 222.383167][T10066] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev}, 0x10) 06:59:28 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x0, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x4004820) 06:59:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4b, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev}, 0x10) 06:59:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_G_AUDIO(0xffffffffffffffff, 0x80345621, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) socketpair(0x14, 0x800, 0xfc, &(0x7f0000000180)={0xffffffffffffffff}) getsockname(r2, &(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000240)=0x80) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet(r3, &(0x7f0000000100)="e55387", 0x3, 0x4, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 06:59:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x18) 06:59:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev}, 0x10) 06:59:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x14, 0x2, 0x9, 0x800000001}, 0x14}}, 0x4004820) 06:59:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x2000010c) 06:59:29 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 06:59:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x14, 0x2, 0x9, 0x800000001}, 0x14}}, 0x4004820) 06:59:29 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:29 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x3, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x3}, {{@in6=@empty}, 0x0, @in=@empty, 0x0, 0x3, 0x2}}, 0xe8) 06:59:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000140)=""/33) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x76, &(0x7f0000000080)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r7, 0xbf, "f5b710980ea7af438493ecf306bbbaad53e8094827d6eacd6d8ca2b42110c646f5f371249695f3da15cafa252c86e3acc0111bb1e9e634e9ddb43bc7e2a599eaa6b5e2cae05f2e1d07a44807a3819f44b307466a8627babdc9dd31eba38ece69859af6b859af8d8b7594df40c7ac88eec9684d1507f8cf74d345eef77cc92e9318e3d2dbbac3d9f1e2c04a0088f389694c307a872b619863add8d4206858538bf1aa1fecb230d459306cbef156f27c92cf9353519e0751e72e9e50ad63b4d9"}, &(0x7f0000000300)=0xc7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000340)={r8, @in={{0x2, 0x4e20, @loopback}}, 0x6, 0x9}, &(0x7f0000000400)=0x90) [ 223.957711][T10132] FAULT_INJECTION: forcing a failure. [ 223.957711][T10132] name failslab, interval 1, probability 0, space 0, times 1 [ 224.006778][T10132] CPU: 1 PID: 10132 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 224.014387][T10132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.024466][T10132] Call Trace: [ 224.027784][T10132] dump_stack+0x172/0x1f0 [ 224.032145][T10132] should_fail.cold+0xa/0x15 [ 224.036769][T10132] ? fault_create_debugfs_attr+0x180/0x180 [ 224.042626][T10132] __should_failslab+0x121/0x190 [ 224.047592][T10132] should_failslab+0x9/0x14 [ 224.052123][T10132] kmem_cache_alloc+0x47/0x710 [ 224.056928][T10132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.063215][T10132] dst_alloc+0x10e/0x200 [ 224.067473][T10132] ? rt_dst_clone+0x820/0x820 [ 224.067513][T10132] rt_dst_alloc+0x83/0x3f0 [ 224.067530][T10132] ip_route_output_key_hash_rcu+0x8d7/0x2d70 [ 224.067544][T10132] ? vsprintf+0x40/0x40 [ 224.067562][T10132] ? ip_route_input_noref+0x270/0x270 [ 224.067579][T10132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.067596][T10132] ? __kasan_check_read+0x11/0x20 [ 224.067614][T10132] ip_route_output_key_hash+0x1ef/0x360 [ 224.067627][T10132] ? ip_route_output_key_hash_rcu+0x2d70/0x2d70 [ 224.067648][T10132] ? tomoyo_read_query+0x520/0x5f0 [ 224.067672][T10132] tcp_v4_connect+0x806/0x1df0 [ 224.067696][T10132] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 224.092440][T10132] ? __kasan_check_read+0x11/0x20 [ 224.109855][T10132] __inet_stream_connect+0x852/0xeb0 [ 224.109879][T10132] ? mark_held_locks+0xa4/0xf0 [ 224.153756][T10132] ? ipv4_mib_init_net+0x570/0x570 [ 224.158980][T10132] ? lock_sock_nested+0x9a/0x120 [ 224.163945][T10132] ? trace_hardirqs_on+0x67/0x240 [ 224.169012][T10132] ? lock_sock_nested+0x9a/0x120 [ 224.173968][T10132] ? __local_bh_enable_ip+0x15a/0x270 [ 224.179367][T10132] inet_stream_connect+0x58/0xa0 [ 224.184333][T10132] __sys_connect+0x264/0x330 [ 224.188943][T10132] ? __ia32_sys_accept+0xb0/0xb0 [ 224.194005][T10132] ? fput+0x1b/0x20 [ 224.197838][T10132] ? ksys_write+0x1cf/0x290 06:59:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x14, 0x2, 0x9, 0x800000001}, 0x14}}, 0x4004820) 06:59:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 224.202368][T10132] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 224.208807][T10132] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 224.214458][T10132] ? do_syscall_64+0x26/0x760 [ 224.219158][T10132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.225258][T10132] ? do_syscall_64+0x26/0x760 [ 224.230222][T10132] __x64_sys_connect+0x73/0xb0 [ 224.235009][T10132] do_syscall_64+0xfa/0x760 [ 224.240319][T10132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.246321][T10132] RIP: 0033:0x459a29 [ 224.250845][T10132] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.270727][T10132] RSP: 002b:00007f9d77420c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 224.270742][T10132] RAX: ffffffffffffffda RBX: 00007f9d77420c90 RCX: 0000000000459a29 [ 224.270749][T10132] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 224.270755][T10132] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 06:59:30 executing program 0 (fault-call:5 fault-nth:1): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x400002, 0x0) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:30 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x92f2, 0x0, 0x1, 0x100000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) quotactl(0xa980, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)="96a2") creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2b0900, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) r4 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000800)={0x68, 0x7d, 0x1, {{0x0, 0x4f, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4'}, 0x4, 'enc=', 0x0, r4}}, 0x68) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) r5 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x62, 0x7d, 0x1, {{0x0, 0x49, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0x9, 'sha3-256\x00'}, 0x4, 'enc=', 0x0, r5}}, 0x62) chown(&(0x7f0000000500)='./bus\x00', r3, r5) r6 = open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = add_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="0e96fed4a7249e4a4a2dd3598021a046dea4d237c7d31dd4276720c87a8c37d639dcbcb967c7c40ca4bbde2403ff0a0ddf25bb65db567c8da211cc896a9111b9db76c9c1f25b7773bbd94d87fe90421a6a0ac03b82a7beb60174355e5c1cbbce8a9492132286aaaafa73eaa81f762bf35043252168eda7c4fcda3c8d467d314f3b8f4704d7311f7e5c19f1fc44f956c1916bfb408ee25b6ec2ee13f6c005de32d1bf73e5e1cb6812dd7ae37f2a73ffcb52f1d0023bf7ea8c678c1e958bb8388037fdaa353bb27c6bda1a50a6e89ac52011c65581b329f9f0e58d06eeb05c6b67f608ccb4363d68ccc156b996862c6dd77a85ad6c34ffc97083ab7ff241712c5f7bf5f3d3ce968b8586f3bbff9086f25070724dc8e930e65f919412a26d6df31da4b56185b292b2c26248f5eaac431bb72b2190079b200fbb7a43eec0e77e9f90242e09d3df777d5933da2b90fce3778c9d34f7271bf0baa92cfe38d47e5fb2bb33e5e09892356341a441ba578e60095165969e3c8afe9059cd9b9182cb058e419dde364328e0172ed7a35e84097fa5fc813ecf23fb99fd26fcfb5a02c29d77cae03fea13da1f632fb8ce61b3c9fc6481a71b6f2fd986c0a6b345c5bbc77ced66cca82fb2e90ce6930c4ba3f4791013bb2036035ce2d341cf4090e27be4daf96c497b5cd282f731e3eb0b8c03b0d50f50d9f6f67c19aa7d19b80cc445f50ac7f6184a52cae63a04bca2b1764b1fc34e54bd4e1a297488f22fe51bc62563c8af8eacafd22ef916ea5604d42e24edbd5251c6ea65affe17ef11ac59c81f09cc70a01b80e0f1c70a091f7779b814766b97516376d1eba6b735bf4f42a3af2f4f7a86239b089e4cb93a04d6ff58b9f51ea69160051ca76caf098aa8c50934e3c536422d215006044f0a3514abc09582d5126d6659431299a56eba3fa32dc9161a3980734a00c27e730cb9ff4982599305b7e1d5a17a6cbb99d565a3ed2cbecf85cbef163a2e92b58331ba199dede532f36f3da9f1c9989f91d1e36d48d8e972ab604e4a673adb8e02529de9318d27743a9b8ad845bceab4de66f3d2ff024c088e07e10f4cdcd84782bc5b949c8beeb8f5d61ae7e84c8ec2d1c66c48c147010457438652688355dcf1f3cd4a36c2aec029e8c05502318658f307cfe40ac2de805825495a939e9cec67e4b16866f04f4c76a4eb26c9ed15f0907a8ccbf76bfa86a3ca12465649a082313dbbb30a413336229feaf87164f1ce3218cb99e8a2c527e93c4a46c18ace391e726bd29eafb678ff7d6263be29eb26140b8478036ca8132166369c702d228917ffa1946a342aad8da6d7b46a711cb2391c39b8381e00b845c1eac6b53a0da21eda79a75e45bb1ed9d73185b576b99046ddff56ab20b8eac0340d1ce035f278b7c0a887cccce26917a8e18d1a8b36748b284e98433450c4eb057ccac2599609180d1ec234b2cb496d10affd7f7cb55f072870a05a57526ba55ca2c2169b369ba964d3b7ebb5c112171264bc56c466291dc0335e2db1a689b995323cb1d5b37e89d7f3db700e72b390a8fe40510fb8466a809dbd2cace559146cbc357894d350f54d1d3e41438abdd4f888606180bd28756122d67930a5fbe5b14c99cb9f5e07b9891da0c70d8f837a3a0234ab7189e629301fc59bbdb982e89f99e244b0f0f6303383fd3117e213aa73c9ac6d5cd4dabfd74ee4371a63792714c972bc09bdd5ed3df33810f2141f5fd621f0", 0xffb2, 0xfffffffffffffffe) keyctl$read(0x3, r8, 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000600)='./file2\x00', 0x0) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c6216684252b3", 0x3b, 0x1}], 0x800040, &(0x7f0000000640)='raw') creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 224.270762][T10132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d774216d4 [ 224.270769][T10132] R13: 00000000004bff70 R14: 00000000004d1ef0 R15: 0000000000000005 [ 224.404769][T10153] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 224.510434][T10163] FAULT_INJECTION: forcing a failure. [ 224.510434][T10163] name failslab, interval 1, probability 0, space 0, times 0 [ 224.538152][T10163] CPU: 0 PID: 10163 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 224.545858][T10163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.555937][T10163] Call Trace: [ 224.559347][T10163] dump_stack+0x172/0x1f0 [ 224.563879][T10163] should_fail.cold+0xa/0x15 [ 224.563899][T10163] ? fault_create_debugfs_attr+0x180/0x180 [ 224.563927][T10163] __should_failslab+0x121/0x190 [ 224.563944][T10163] should_failslab+0x9/0x14 [ 224.579434][T10163] kmem_cache_alloc+0x47/0x710 [ 224.579460][T10163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.579481][T10163] dst_alloc+0x10e/0x200 [ 224.599679][T10163] ? rt_dst_clone+0x820/0x820 [ 224.604510][T10163] rt_dst_alloc+0x83/0x3f0 [ 224.609038][T10163] ip_route_output_key_hash_rcu+0x8d7/0x2d70 [ 224.615047][T10163] ? ip_route_input_noref+0x270/0x270 [ 224.620456][T10163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.626733][T10163] ? __kasan_check_read+0x11/0x20 [ 224.631787][T10163] ip_route_output_key_hash+0x1ef/0x360 [ 224.637467][T10163] ? ip_route_output_key_hash_rcu+0x2d70/0x2d70 [ 224.643774][T10163] ? lockdep_hardirqs_on+0x421/0x5e0 [ 224.649442][T10163] ip_route_output_flow+0x28/0xc0 [ 224.654526][T10163] tcp_v4_connect+0x8bc/0x1df0 [ 224.659308][T10163] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 224.664904][T10163] ? __kasan_check_read+0x11/0x20 [ 224.670075][T10163] __inet_stream_connect+0x852/0xeb0 [ 224.675401][T10163] ? mark_held_locks+0xa4/0xf0 [ 224.680509][T10163] ? ipv4_mib_init_net+0x570/0x570 [ 224.685622][T10163] ? lock_sock_nested+0x9a/0x120 [ 224.690548][T10163] ? trace_hardirqs_on+0x67/0x240 [ 224.695577][T10163] ? lock_sock_nested+0x9a/0x120 [ 224.700527][T10163] ? __local_bh_enable_ip+0x15a/0x270 [ 224.706046][T10163] inet_stream_connect+0x58/0xa0 [ 224.711002][T10163] __sys_connect+0x264/0x330 [ 224.715602][T10163] ? __ia32_sys_accept+0xb0/0xb0 [ 224.720552][T10163] ? fput+0x1b/0x20 [ 224.724370][T10163] ? ksys_write+0x1cf/0x290 [ 224.728888][T10163] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 224.734369][T10163] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 224.739835][T10163] ? do_syscall_64+0x26/0x760 [ 224.744500][T10163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.750661][T10163] ? do_syscall_64+0x26/0x760 [ 224.755351][T10163] __x64_sys_connect+0x73/0xb0 [ 224.760108][T10163] do_syscall_64+0xfa/0x760 [ 224.764637][T10163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.770656][T10163] RIP: 0033:0x459a29 [ 224.774592][T10163] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.794312][T10163] RSP: 002b:00007f9d77420c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 224.802744][T10163] RAX: ffffffffffffffda RBX: 00007f9d77420c90 RCX: 0000000000459a29 06:59:30 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 06:59:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x4004820) 06:59:30 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x92f2, 0x0, 0x1, 0x100000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) quotactl(0xa980, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)="96a2") creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2b0900, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) r4 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000800)={0x68, 0x7d, 0x1, {{0x0, 0x4f, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4'}, 0x4, 'enc=', 0x0, r4}}, 0x68) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) r5 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x62, 0x7d, 0x1, {{0x0, 0x49, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0x9, 'sha3-256\x00'}, 0x4, 'enc=', 0x0, r5}}, 0x62) chown(&(0x7f0000000500)='./bus\x00', r3, r5) r6 = open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = add_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="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", 0xffb2, 0xfffffffffffffffe) keyctl$read(0x3, r8, 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000600)='./file2\x00', 0x0) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c6216684252b3", 0x3b, 0x1}], 0x800040, &(0x7f0000000640)='raw') creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 224.810736][T10163] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 224.818729][T10163] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 224.826716][T10163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d774216d4 [ 224.834710][T10163] R13: 00000000004bff70 R14: 00000000004d1ef0 R15: 0000000000000005 06:59:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VFIO_SET_IOMMU(r3, 0x3b66, 0x2) 06:59:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x4004820) [ 224.862288][T10172] validate_nla: 6 callbacks suppressed [ 224.862302][T10172] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:30 executing program 0 (fault-call:5 fault-nth:2): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) r1 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000002c0)=0x9) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000080)=""/195, 0x200000d7}], 0x1) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[], 0xf5) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 225.109443][T10190] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x4004820) [ 225.254045][T10194] FAULT_INJECTION: forcing a failure. [ 225.254045][T10194] name failslab, interval 1, probability 0, space 0, times 0 [ 225.267197][T10194] CPU: 1 PID: 10194 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 225.274759][T10194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.284837][T10194] Call Trace: [ 225.288172][T10194] dump_stack+0x172/0x1f0 [ 225.292564][T10194] should_fail.cold+0xa/0x15 [ 225.297210][T10194] ? fault_create_debugfs_attr+0x180/0x180 [ 225.303057][T10194] __should_failslab+0x121/0x190 [ 225.308021][T10194] should_failslab+0x9/0x14 [ 225.312569][T10194] kmem_cache_alloc+0x47/0x710 [ 225.318222][T10194] ? rwlock_bug.part.0+0x90/0x90 [ 225.323181][T10194] ? lock_acquire+0x190/0x410 [ 225.327888][T10194] ? __inet_hash_connect+0x42f/0xfd0 [ 225.333199][T10194] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 225.338945][T10194] inet_bind_bucket_create+0x2e/0x290 [ 225.344342][T10194] __inet_hash_connect+0x6f8/0xfd0 [ 225.349480][T10194] ? inet_unhash+0x850/0x850 06:59:31 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x92f2, 0x0, 0x1, 0x100000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) quotactl(0xa980, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)="96a2") creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2b0900, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) r4 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000800)={0x68, 0x7d, 0x1, {{0x0, 0x4f, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4'}, 0x4, 'enc=', 0x0, r4}}, 0x68) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) r5 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x62, 0x7d, 0x1, {{0x0, 0x49, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0x9, 'sha3-256\x00'}, 0x4, 'enc=', 0x0, r5}}, 0x62) chown(&(0x7f0000000500)='./bus\x00', r3, r5) r6 = open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = add_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="0e96fed4a7249e4a4a2dd3598021a046dea4d237c7d31dd4276720c87a8c37d639dcbcb967c7c40ca4bbde2403ff0a0ddf25bb65db567c8da211cc896a9111b9db76c9c1f25b7773bbd94d87fe90421a6a0ac03b82a7beb60174355e5c1cbbce8a9492132286aaaafa73eaa81f762bf35043252168eda7c4fcda3c8d467d314f3b8f4704d7311f7e5c19f1fc44f956c1916bfb408ee25b6ec2ee13f6c005de32d1bf73e5e1cb6812dd7ae37f2a73ffcb52f1d0023bf7ea8c678c1e958bb8388037fdaa353bb27c6bda1a50a6e89ac52011c65581b329f9f0e58d06eeb05c6b67f608ccb4363d68ccc156b996862c6dd77a85ad6c34ffc97083ab7ff241712c5f7bf5f3d3ce968b8586f3bbff9086f25070724dc8e930e65f919412a26d6df31da4b56185b292b2c26248f5eaac431bb72b2190079b200fbb7a43eec0e77e9f90242e09d3df777d5933da2b90fce3778c9d34f7271bf0baa92cfe38d47e5fb2bb33e5e09892356341a441ba578e60095165969e3c8afe9059cd9b9182cb058e419dde364328e0172ed7a35e84097fa5fc813ecf23fb99fd26fcfb5a02c29d77cae03fea13da1f632fb8ce61b3c9fc6481a71b6f2fd986c0a6b345c5bbc77ced66cca82fb2e90ce6930c4ba3f4791013bb2036035ce2d341cf4090e27be4daf96c497b5cd282f731e3eb0b8c03b0d50f50d9f6f67c19aa7d19b80cc445f50ac7f6184a52cae63a04bca2b1764b1fc34e54bd4e1a297488f22fe51bc62563c8af8eacafd22ef916ea5604d42e24edbd5251c6ea65affe17ef11ac59c81f09cc70a01b80e0f1c70a091f7779b814766b97516376d1eba6b735bf4f42a3af2f4f7a86239b089e4cb93a04d6ff58b9f51ea69160051ca76caf098aa8c50934e3c536422d215006044f0a3514abc09582d5126d6659431299a56eba3fa32dc9161a3980734a00c27e730cb9ff4982599305b7e1d5a17a6cbb99d565a3ed2cbecf85cbef163a2e92b58331ba199dede532f36f3da9f1c9989f91d1e36d48d8e972ab604e4a673adb8e02529de9318d27743a9b8ad845bceab4de66f3d2ff024c088e07e10f4cdcd84782bc5b949c8beeb8f5d61ae7e84c8ec2d1c66c48c147010457438652688355dcf1f3cd4a36c2aec029e8c05502318658f307cfe40ac2de805825495a939e9cec67e4b16866f04f4c76a4eb26c9ed15f0907a8ccbf76bfa86a3ca12465649a082313dbbb30a413336229feaf87164f1ce3218cb99e8a2c527e93c4a46c18ace391e726bd29eafb678ff7d6263be29eb26140b8478036ca8132166369c702d228917ffa1946a342aad8da6d7b46a711cb2391c39b8381e00b845c1eac6b53a0da21eda79a75e45bb1ed9d73185b576b99046ddff56ab20b8eac0340d1ce035f278b7c0a887cccce26917a8e18d1a8b36748b284e98433450c4eb057ccac2599609180d1ec234b2cb496d10affd7f7cb55f072870a05a57526ba55ca2c2169b369ba964d3b7ebb5c112171264bc56c466291dc0335e2db1a689b995323cb1d5b37e89d7f3db700e72b390a8fe40510fb8466a809dbd2cace559146cbc357894d350f54d1d3e41438abdd4f888606180bd28756122d67930a5fbe5b14c99cb9f5e07b9891da0c70d8f837a3a0234ab7189e629301fc59bbdb982e89f99e244b0f0f6303383fd3117e213aa73c9ac6d5cd4dabfd74ee4371a63792714c972bc09bdd5ed3df33810f2141f5fd621f0", 0xffb2, 0xfffffffffffffffe) keyctl$read(0x3, r8, 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000600)='./file2\x00', 0x0) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c6216684252b3", 0x3b, 0x1}], 0x800040, &(0x7f0000000640)='raw') creat(&(0x7f0000000100)='./bus\x00', 0x0) 06:59:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 225.354100][T10194] ? inet_hash+0xb0/0xb0 [ 225.358369][T10194] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 225.364637][T10194] inet_hash_connect+0x7a/0x150 [ 225.369507][T10194] tcp_v4_connect+0xe5f/0x1df0 [ 225.374314][T10194] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 225.379803][T10194] ? __kasan_check_read+0x11/0x20 [ 225.384908][T10194] __inet_stream_connect+0x852/0xeb0 [ 225.390234][T10194] ? mark_held_locks+0xa4/0xf0 [ 225.395015][T10194] ? ipv4_mib_init_net+0x570/0x570 [ 225.400139][T10194] ? lock_sock_nested+0x9a/0x120 [ 225.405084][T10194] ? trace_hardirqs_on+0x67/0x240 [ 225.405148][T10194] ? lock_sock_nested+0x9a/0x120 [ 225.405169][T10194] ? __local_bh_enable_ip+0x15a/0x270 [ 225.405189][T10194] inet_stream_connect+0x58/0xa0 [ 225.405210][T10194] __sys_connect+0x264/0x330 [ 225.405225][T10194] ? __ia32_sys_accept+0xb0/0xb0 [ 225.405244][T10194] ? fput+0x1b/0x20 [ 225.405255][T10194] ? ksys_write+0x1cf/0x290 [ 225.405275][T10194] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 225.405293][T10194] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 225.420900][T10203] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 225.425618][T10194] ? do_syscall_64+0x26/0x760 [ 225.425637][T10194] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.425651][T10194] ? do_syscall_64+0x26/0x760 [ 225.425678][T10194] __x64_sys_connect+0x73/0xb0 [ 225.425694][T10194] do_syscall_64+0xfa/0x760 [ 225.425709][T10194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.425720][T10194] RIP: 0033:0x459a29 [ 225.425734][T10194] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 225.425741][T10194] RSP: 002b:00007f9d77420c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 225.425753][T10194] RAX: ffffffffffffffda RBX: 00007f9d77420c90 RCX: 0000000000459a29 [ 225.425760][T10194] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 225.425768][T10194] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.425776][T10194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d774216d4 [ 225.425783][T10194] R13: 00000000004bff70 R14: 00000000004d1ef0 R15: 0000000000000005 [ 225.504763][T10207] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 06:59:31 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 06:59:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:31 executing program 0 (fault-call:5 fault-nth:3): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f00000002c0)=0x9) readv(r3, &(0x7f0000000280)=[{&(0x7f0000000080)=""/195, 0x200000d7}], 0x1) write$binfmt_elf32(r3, &(0x7f0000000480)=ANY=[], 0xf5) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) ptrace(0x10, r4) sched_setscheduler(r4, 0x2, &(0x7f0000000080)=0x4) ptrace(0x10, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000340)) r7 = syz_open_procfs(r2, &(0x7f0000000180)='fd\x00') getdents64(r7, &(0x7f00000001c0)=""/140, 0x8c) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8000, 0x82e02) 06:59:31 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x92f2, 0x0, 0x1, 0x100000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) quotactl(0xa980, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)="96a2") creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2b0900, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) r4 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000800)={0x68, 0x7d, 0x1, {{0x0, 0x4f, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4'}, 0x4, 'enc=', 0x0, r4}}, 0x68) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) r5 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x62, 0x7d, 0x1, {{0x0, 0x49, 0x9, 0x0, {0xc0}, 0x0, 0x0, 0x1a, 0x8af8, 0x9, 'sha3-256\x00', 0x4, 'enc=', 0x9, 'sha3-256\x00'}, 0x4, 'enc=', 0x0, r5}}, 0x62) chown(&(0x7f0000000500)='./bus\x00', r3, r5) r6 = open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = add_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="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", 0xffb2, 0xfffffffffffffffe) keyctl$read(0x3, r8, 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000600)='./file2\x00', 0x0) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c6216684252b3", 0x3b, 0x1}], 0x800040, &(0x7f0000000640)='raw') creat(&(0x7f0000000100)='./bus\x00', 0x0) 06:59:31 executing program 2: ioctl$DRM_IOCTL_AGP_RELEASE(0xffffffffffffffff, 0x6431) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 225.814692][T10217] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) r1 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000002c0)=0x9) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000080)=""/195, 0x200000d7}], 0x1) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[], 0xf5) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:31 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 226.001791][T10237] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_IOCTL(r1, &(0x7f0000000140)={0x20, 0x0, 0x4, {0x7, 0x0, 0x4, 0x1}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r2, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSIG(r1, 0x40045436, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r2, &(0x7f0000000080)=""/140, 0x8c) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f00000001c0)=0x1) 06:59:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 226.082564][T10242] FAULT_INJECTION: forcing a failure. [ 226.082564][T10242] name failslab, interval 1, probability 0, space 0, times 0 [ 226.129611][T10243] FAULT_INJECTION: forcing a failure. [ 226.129611][T10243] name failslab, interval 1, probability 0, space 0, times 0 [ 226.150657][T10242] CPU: 1 PID: 10242 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 226.158257][T10242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.168328][T10242] Call Trace: [ 226.171751][T10242] dump_stack+0x172/0x1f0 [ 226.176123][T10242] should_fail.cold+0xa/0x15 [ 226.180737][T10242] ? fault_create_debugfs_attr+0x180/0x180 [ 226.186571][T10242] ? ___might_sleep+0x163/0x2c0 [ 226.191448][T10242] __should_failslab+0x121/0x190 [ 226.196422][T10242] should_failslab+0x9/0x14 [ 226.200951][T10242] kmem_cache_alloc_node+0x268/0x740 [ 226.206270][T10242] __alloc_skb+0xd5/0x5e0 [ 226.210660][T10242] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 226.216233][T10242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.222502][T10242] ? netlink_autobind.isra.0+0x228/0x310 [ 226.228166][T10242] netlink_sendmsg+0x972/0xd60 [ 226.232964][T10242] ? netlink_unicast+0x710/0x710 [ 226.237922][T10242] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 226.243583][T10242] ? apparmor_socket_sendmsg+0x2a/0x30 [ 226.249104][T10242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.255373][T10242] ? security_socket_sendmsg+0x8d/0xc0 [ 226.260862][T10242] ? netlink_unicast+0x710/0x710 [ 226.265826][T10242] sock_sendmsg+0xd7/0x130 [ 226.270271][T10242] ___sys_sendmsg+0x803/0x920 [ 226.274974][T10242] ? copy_msghdr_from_user+0x440/0x440 [ 226.280455][T10242] ? __kasan_check_read+0x11/0x20 [ 226.285497][T10242] ? __fget+0x384/0x560 [ 226.289659][T10242] ? ksys_dup3+0x3e0/0x3e0 [ 226.294110][T10242] ? __fget_light+0x1a9/0x230 [ 226.298800][T10242] ? __fdget+0x1b/0x20 [ 226.302878][T10242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.309209][T10242] __sys_sendmsg+0x105/0x1d0 [ 226.313800][T10242] ? __sys_sendmsg_sock+0xd0/0xd0 [ 226.318853][T10242] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 226.324336][T10242] ? do_syscall_64+0x26/0x760 [ 226.329020][T10242] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.335229][T10242] ? do_syscall_64+0x26/0x760 [ 226.339923][T10242] __x64_sys_sendmsg+0x78/0xb0 [ 226.344699][T10242] do_syscall_64+0xfa/0x760 [ 226.344724][T10242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.344737][T10242] RIP: 0033:0x459a29 [ 226.344753][T10242] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.344760][T10242] RSP: 002b:00007f2d8d538c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 226.344772][T10242] RAX: ffffffffffffffda RBX: 00007f2d8d538c90 RCX: 0000000000459a29 [ 226.344778][T10242] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 226.344785][T10242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.344793][T10242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d8d5396d4 [ 226.344799][T10242] R13: 00000000004c7953 R14: 00000000004dd368 R15: 0000000000000004 [ 226.346544][T10243] CPU: 1 PID: 10243 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 226.359190][T10243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.359198][T10243] Call Trace: [ 226.359222][T10243] dump_stack+0x172/0x1f0 [ 226.359244][T10243] should_fail.cold+0xa/0x15 [ 226.458220][T10243] ? fault_create_debugfs_attr+0x180/0x180 [ 226.464065][T10243] __should_failslab+0x121/0x190 [ 226.469047][T10243] should_failslab+0x9/0x14 [ 226.473575][T10243] kmem_cache_alloc+0x47/0x710 [ 226.480028][T10243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.486413][T10243] dst_alloc+0x10e/0x200 [ 226.486673][T10253] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 226.490674][T10243] ? rt_dst_clone+0x820/0x820 [ 226.490690][T10243] rt_dst_alloc+0x83/0x3f0 [ 226.490712][T10243] ip_route_output_key_hash_rcu+0x8d7/0x2d70 [ 226.490736][T10243] ? ip_route_input_noref+0x270/0x270 [ 226.490755][T10243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.490777][T10243] ? __kasan_check_read+0x11/0x20 [ 226.530788][T10243] ip_route_output_key_hash+0x1ef/0x360 [ 226.536354][T10243] ? ip_route_output_key_hash_rcu+0x2d70/0x2d70 [ 226.542798][T10243] ? lockdep_hardirqs_on+0x421/0x5e0 [ 226.548115][T10243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.554383][T10243] ip_route_output_flow+0x28/0xc0 [ 226.559418][T10243] tcp_v4_connect+0x133f/0x1df0 [ 226.564308][T10243] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 226.569790][T10243] ? __kasan_check_read+0x11/0x20 [ 226.574842][T10243] __inet_stream_connect+0x852/0xeb0 [ 226.580147][T10243] ? mark_held_locks+0xa4/0xf0 [ 226.584929][T10243] ? ipv4_mib_init_net+0x570/0x570 [ 226.590139][T10243] ? lock_sock_nested+0x9a/0x120 [ 226.595091][T10243] ? trace_hardirqs_on+0x67/0x240 [ 226.600829][T10243] ? lock_sock_nested+0x9a/0x120 [ 226.605922][T10243] ? __local_bh_enable_ip+0x15a/0x270 [ 226.611318][T10243] inet_stream_connect+0x58/0xa0 [ 226.616274][T10243] __sys_connect+0x264/0x330 [ 226.620897][T10243] ? __ia32_sys_accept+0xb0/0xb0 [ 226.625858][T10243] ? fput+0x1b/0x20 [ 226.629680][T10243] ? ksys_write+0x1cf/0x290 [ 226.634202][T10243] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 226.639757][T10243] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 226.645207][T10243] ? do_syscall_64+0x26/0x760 [ 226.645225][T10243] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.645236][T10243] ? do_syscall_64+0x26/0x760 [ 226.645259][T10243] __x64_sys_connect+0x73/0xb0 [ 226.645275][T10243] do_syscall_64+0xfa/0x760 [ 226.645291][T10243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.645302][T10243] RIP: 0033:0x459a29 [ 226.645318][T10243] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.645325][T10243] RSP: 002b:00007f9d77420c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 226.645343][T10243] RAX: ffffffffffffffda RBX: 00007f9d77420c90 RCX: 0000000000459a29 [ 226.720716][T10243] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 226.728707][T10243] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.736696][T10243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d774216d4 [ 226.744709][T10243] R13: 00000000004bff70 R14: 00000000004d1ef0 R15: 0000000000000005 06:59:32 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:32 executing program 5 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:32 executing program 0 (fault-call:5 fault-nth:4): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) close(r0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x2800) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0xc6, 0x20, 0xc, 0x6, 0x40, 0x5f, 0x7, 0x3f, 0x3, 0x9c, 0x2}, 0xb) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_CALL(r6, 0x4008af21, &(0x7f0000000100)={0x1}) ftruncate(r4, 0x200004) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004000) sendfile(r0, r9, 0x0, 0x80001d00c0d0) 06:59:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140)=0x8000, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 226.896019][T10268] FAULT_INJECTION: forcing a failure. [ 226.896019][T10268] name failslab, interval 1, probability 0, space 0, times 0 [ 226.911129][T10264] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 226.915459][T10269] FAULT_INJECTION: forcing a failure. [ 226.915459][T10269] name failslab, interval 1, probability 0, space 0, times 0 [ 226.958856][T10275] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 226.981892][T10268] CPU: 0 PID: 10268 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 226.989493][T10268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.999588][T10268] Call Trace: [ 227.002912][T10268] dump_stack+0x172/0x1f0 [ 227.007292][T10268] should_fail.cold+0xa/0x15 [ 227.011915][T10268] ? fault_create_debugfs_attr+0x180/0x180 [ 227.017751][T10268] ? ___might_sleep+0x163/0x2c0 [ 227.022634][T10268] __should_failslab+0x121/0x190 [ 227.027580][T10268] should_failslab+0x9/0x14 [ 227.032097][T10268] kmem_cache_alloc_node_trace+0x274/0x750 [ 227.037904][T10268] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 227.043881][T10268] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 227.049695][T10268] __kmalloc_node_track_caller+0x3d/0x70 [ 227.055328][T10268] __kmalloc_reserve.isra.0+0x40/0xf0 [ 227.060701][T10268] __alloc_skb+0x10b/0x5e0 [ 227.065115][T10268] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 227.070660][T10268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.076902][T10268] ? netlink_autobind.isra.0+0x228/0x310 [ 227.082539][T10268] netlink_sendmsg+0x972/0xd60 [ 227.087316][T10268] ? netlink_unicast+0x710/0x710 [ 227.092253][T10268] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 227.097799][T10268] ? apparmor_socket_sendmsg+0x2a/0x30 [ 227.103259][T10268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.109511][T10268] ? security_socket_sendmsg+0x8d/0xc0 [ 227.114987][T10268] ? netlink_unicast+0x710/0x710 [ 227.119927][T10268] sock_sendmsg+0xd7/0x130 [ 227.124356][T10268] ___sys_sendmsg+0x803/0x920 [ 227.129056][T10268] ? copy_msghdr_from_user+0x440/0x440 [ 227.134521][T10268] ? __kasan_check_read+0x11/0x20 [ 227.139560][T10268] ? __fget+0x384/0x560 [ 227.143722][T10268] ? ksys_dup3+0x3e0/0x3e0 [ 227.148144][T10268] ? __fget_light+0x1a9/0x230 [ 227.152827][T10268] ? __fdget+0x1b/0x20 [ 227.156896][T10268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.163146][T10268] __sys_sendmsg+0x105/0x1d0 [ 227.167731][T10268] ? __sys_sendmsg_sock+0xd0/0xd0 [ 227.172758][T10268] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 227.178740][T10268] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 227.184193][T10268] ? do_syscall_64+0x26/0x760 [ 227.188868][T10268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.194931][T10268] ? do_syscall_64+0x26/0x760 [ 227.199611][T10268] __x64_sys_sendmsg+0x78/0xb0 [ 227.204373][T10268] do_syscall_64+0xfa/0x760 [ 227.208878][T10268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.214764][T10268] RIP: 0033:0x459a29 [ 227.218656][T10268] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.238256][T10268] RSP: 002b:00007f2d8d538c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 227.246667][T10268] RAX: ffffffffffffffda RBX: 00007f2d8d538c90 RCX: 0000000000459a29 [ 227.254643][T10268] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 227.262612][T10268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 227.270575][T10268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d8d5396d4 [ 227.279151][T10268] R13: 00000000004c7953 R14: 00000000004dd368 R15: 0000000000000004 [ 227.287142][T10269] CPU: 1 PID: 10269 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 227.294701][T10269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.304766][T10269] Call Trace: [ 227.308078][T10269] dump_stack+0x172/0x1f0 [ 227.312423][T10269] should_fail.cold+0xa/0x15 [ 227.317027][T10269] ? fault_create_debugfs_attr+0x180/0x180 [ 227.322851][T10269] ? ___might_sleep+0x163/0x2c0 [ 227.328276][T10269] __should_failslab+0x121/0x190 [ 227.333263][T10269] should_failslab+0x9/0x14 [ 227.337782][T10269] kmem_cache_alloc_node+0x268/0x740 [ 227.337801][T10269] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 227.337819][T10269] ? lockdep_hardirqs_on+0x421/0x5e0 [ 227.337835][T10269] ? retint_kernel+0x2b/0x2b [ 227.337855][T10269] __alloc_skb+0xd5/0x5e0 [ 227.337871][T10269] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 227.337897][T10269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.353919][T10269] ? tcp_write_queue_purge+0x5d8/0x1310 [ 227.353940][T10269] sk_stream_alloc_skb+0x113/0xc50 [ 227.353965][T10269] tcp_connect+0x1042/0x4320 [ 227.353991][T10269] ? __tcp_transmit_skb+0x3820/0x3820 [ 227.395365][T10269] ? dst_release+0x62/0xb0 [ 227.399821][T10269] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 227.406082][T10269] ? sk_setup_caps+0x20a/0x6a0 [ 227.410869][T10269] tcp_v4_connect+0x1604/0x1df0 [ 227.415754][T10269] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 227.421227][T10269] ? __kasan_check_read+0x11/0x20 [ 227.426268][T10269] __inet_stream_connect+0x852/0xeb0 [ 227.431566][T10269] ? mark_held_locks+0xa4/0xf0 [ 227.436349][T10269] ? ipv4_mib_init_net+0x570/0x570 [ 227.441823][T10269] ? lock_sock_nested+0x9a/0x120 [ 227.446770][T10269] ? trace_hardirqs_on+0x67/0x240 [ 227.451812][T10269] ? lock_sock_nested+0x9a/0x120 [ 227.456769][T10269] ? __local_bh_enable_ip+0x15a/0x270 [ 227.462335][T10269] inet_stream_connect+0x58/0xa0 [ 227.467288][T10269] __sys_connect+0x264/0x330 [ 227.471909][T10269] ? __ia32_sys_accept+0xb0/0xb0 [ 227.476868][T10269] ? fput+0x1b/0x20 [ 227.480697][T10269] ? ksys_write+0x1cf/0x290 [ 227.485220][T10269] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 227.490683][T10269] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 227.490704][T10269] ? do_syscall_64+0x26/0x760 [ 227.500824][T10269] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.506918][T10269] ? do_syscall_64+0x26/0x760 [ 227.511612][T10269] __x64_sys_connect+0x73/0xb0 [ 227.511633][T10269] do_syscall_64+0xfa/0x760 [ 227.511660][T10269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.526791][T10269] RIP: 0033:0x459a29 [ 227.530694][T10269] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.550333][T10269] RSP: 002b:00007f9d77420c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 227.558750][T10269] RAX: ffffffffffffffda RBX: 00007f9d77420c90 RCX: 0000000000459a29 [ 227.558758][T10269] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 227.558765][T10269] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 227.558772][T10269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d774216d4 [ 227.558780][T10269] R13: 00000000004bff70 R14: 00000000004d1ef0 R15: 0000000000000005 [ 227.559668][ C1] net_ratelimit: 2 callbacks suppressed [ 227.559677][ C1] protocol 88fb is buggy, dev hsr_slave_0 06:59:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) setsockopt$inet_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000200)="31a080031739463da44d222940cdb248262183cda5f0f5e998c0a5b0f445344afdf300695a0c57b66fd73502fec996cd3c32cce43ed3ce1812331f43a4c88383f8e08a28147f68d7b077c5853a841cd9020d5001d8d8289e7612eb620082ae73a067aa0075917a68ae51e0be75ede68d6c018a04922a5f71af7723f6b4f8ae9635d000a1f56e087816973b36c96fd9c0b74fd6bccda89612739933c35934881b8589c3ca7a2876543832f7001297907cebf9d4e8bdee872b57367cfb3ce96369e54d951d2915ea41fdd1f27eba1462", 0xcf) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000380)=""/140, 0x52) 06:59:33 executing program 5 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:33 executing program 0 (fault-call:5 fault-nth:5): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 227.599016][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 227.604626][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 227.621763][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:59:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:33 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) fsetxattr$security_smack_transmute(r2, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r4 = accept4(r3, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80, 0x100800) sendmsg$sock(r4, &(0x7f00000014c0)={&(0x7f0000000280)=@sco={0x1f, {0x6, 0x6, 0x2, 0x3, 0x45, 0xf9}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="0c18016b855711811959b0420d40dfa83329d8c143001d498d0fdeb9dabd04ccd5a382391a98c7183244e6247f850f3b7b970132c0fb9063f948a8fcc1bc5c7845cff665cd2df412a5064e3e98f0c297c1bdab9c4a5c23a3e947388497f254c8d6e44f71b66d411f95e8a15ac8d79e816935f566f3017b4c8949a296bafd3446fe6f28e26866c24c4d892d66c741cdb30799ad29be60f1cf83d2e01b9839634fab20d433c9ff568043a230923103171e68cbeef28bfc7cde68c1eb88c974787b2b742306d64105118c5fff", 0xcb}], 0x2, &(0x7f0000001440)=[@txtime={{0x18, 0x1, 0x3d, 0x392}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x48}, 0x40) [ 227.683384][T10285] FAULT_INJECTION: forcing a failure. [ 227.683384][T10285] name failslab, interval 1, probability 0, space 0, times 0 [ 227.744553][T10285] CPU: 1 PID: 10285 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 227.752138][T10285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.752153][T10285] Call Trace: [ 227.765620][T10285] dump_stack+0x172/0x1f0 [ 227.769978][T10285] should_fail.cold+0xa/0x15 [ 227.774598][T10285] ? fault_create_debugfs_attr+0x180/0x180 [ 227.780448][T10285] __should_failslab+0x121/0x190 [ 227.780471][T10285] should_failslab+0x9/0x14 [ 227.789897][T10285] kmem_cache_alloc+0x47/0x710 [ 227.794685][T10285] ? lock_acquire+0x190/0x410 [ 227.799384][T10285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.805653][T10285] skb_clone+0x154/0x3d0 [ 227.809915][T10285] netlink_deliver_tap+0x94d/0xbf0 [ 227.815068][T10285] netlink_unicast+0x5a2/0x710 [ 227.819842][T10285] ? netlink_attachskb+0x7c0/0x7c0 [ 227.824963][T10285] ? _copy_from_iter_full+0x25d/0x8c0 [ 227.830348][T10285] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 227.836075][T10285] ? __check_object_size+0x3d/0x437 [ 227.836103][T10285] netlink_sendmsg+0x8a5/0xd60 [ 227.836122][T10285] ? netlink_unicast+0x710/0x710 [ 227.836136][T10285] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 227.836154][T10285] ? apparmor_socket_sendmsg+0x2a/0x30 [ 227.836171][T10285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.836188][T10285] ? security_socket_sendmsg+0x8d/0xc0 [ 227.836202][T10285] ? netlink_unicast+0x710/0x710 [ 227.836220][T10285] sock_sendmsg+0xd7/0x130 [ 227.836239][T10285] ___sys_sendmsg+0x803/0x920 [ 227.851147][T10285] ? copy_msghdr_from_user+0x440/0x440 [ 227.894236][T10285] ? __kasan_check_read+0x11/0x20 [ 227.899293][T10285] ? __fget+0x384/0x560 [ 227.903479][T10285] ? ksys_dup3+0x3e0/0x3e0 [ 227.905867][T10297] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 227.907924][T10285] ? __fget_light+0x1a9/0x230 [ 227.907943][T10285] ? __fdget+0x1b/0x20 [ 227.907970][T10285] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.932297][T10285] __sys_sendmsg+0x105/0x1d0 [ 227.936912][T10285] ? __sys_sendmsg_sock+0xd0/0xd0 [ 227.941970][T10285] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 227.947452][T10285] ? do_syscall_64+0x26/0x760 [ 227.952150][T10285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.958256][T10285] ? do_syscall_64+0x26/0x760 [ 227.962954][T10285] __x64_sys_sendmsg+0x78/0xb0 [ 227.967732][T10285] do_syscall_64+0xfa/0x760 [ 227.972265][T10285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.978167][T10285] RIP: 0033:0x459a29 [ 227.982072][T10285] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.001687][T10285] RSP: 002b:00007f2d8d538c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 228.010119][T10285] RAX: ffffffffffffffda RBX: 00007f2d8d538c90 RCX: 0000000000459a29 [ 228.018110][T10285] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 228.026103][T10285] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.027776][T10292] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 228.034084][T10285] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d8d5396d4 [ 228.034093][T10285] R13: 00000000004c7953 R14: 00000000004dd368 R15: 0000000000000004 06:59:33 executing program 5 (fault-call:1 fault-nth:3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:34 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\f\xee\xc6\xcb\"I\xd0AVImG\x9e~\x01\xf0,\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xca\xcf\x13\x19\xc5I\t@\x00\x00\x00\x00\x00\x00@\x03\xee\xce2\xa3\'\xcb\xa6\xf2\xba\xc6x\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc') r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x20000000, &(0x7f00000003c0)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) syz_open_dev$video(0x0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x40000000000009, 0xffffffffffffffff, 0xe) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x0) write$uinput_user_dev(r4, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r4, 0x5501) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r5, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x0) write$uinput_user_dev(r5, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x45c) ioctl$UI_DEV_CREATE(r5, 0x5501) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x81}, &(0x7f0000000080)=0x8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) [ 228.231719][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 228.278024][T10316] FAULT_INJECTION: forcing a failure. [ 228.278024][T10316] name failslab, interval 1, probability 0, space 0, times 0 [ 228.313754][T10319] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 228.326806][T10316] CPU: 1 PID: 10316 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 228.334407][T10316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.344480][T10316] Call Trace: [ 228.347802][T10316] dump_stack+0x172/0x1f0 [ 228.352165][T10316] should_fail.cold+0xa/0x15 [ 228.356785][T10316] ? fault_create_debugfs_attr+0x180/0x180 [ 228.362622][T10316] ? ___might_sleep+0x163/0x2c0 [ 228.367496][T10316] __should_failslab+0x121/0x190 [ 228.372458][T10316] should_failslab+0x9/0x14 [ 228.376979][T10316] kmem_cache_alloc_node+0x268/0x740 [ 228.382294][T10316] __alloc_skb+0xd5/0x5e0 [ 228.386646][T10316] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 228.392211][T10316] ? __local_bh_enable_ip+0x15a/0x270 [ 228.397593][T10316] ? __dev_queue_xmit+0x17cb/0x3720 [ 228.402809][T10316] ? __local_bh_enable_ip+0x15a/0x270 [ 228.402835][T10316] netlink_ack+0x25c/0xb50 [ 228.402855][T10316] ? netlink_sendmsg+0xd60/0xd60 [ 228.417574][T10316] netlink_rcv_skb+0x376/0x450 [ 228.422366][T10316] ? nfnetlink_bind+0x2c0/0x2c0 [ 228.427243][T10316] ? netlink_ack+0xb50/0xb50 [ 228.431852][T10316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.438113][T10316] ? ns_capable_common+0x93/0x100 [ 228.443157][T10316] ? ns_capable+0x20/0x30 [ 228.447502][T10316] ? __netlink_ns_capable+0x104/0x140 [ 228.452901][T10316] nfnetlink_rcv+0x1ba/0x460 [ 228.457502][T10316] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 228.462975][T10316] ? netlink_deliver_tap+0x254/0xbf0 [ 228.468278][T10316] netlink_unicast+0x531/0x710 [ 228.473070][T10316] ? netlink_attachskb+0x7c0/0x7c0 [ 228.478198][T10316] ? _copy_from_iter_full+0x25d/0x8c0 [ 228.483603][T10316] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 228.489327][T10316] ? __check_object_size+0x3d/0x437 [ 228.494556][T10316] netlink_sendmsg+0x8a5/0xd60 [ 228.494579][T10316] ? netlink_unicast+0x710/0x710 [ 228.494593][T10316] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 228.494608][T10316] ? apparmor_socket_sendmsg+0x2a/0x30 [ 228.494625][T10316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.494641][T10316] ? security_socket_sendmsg+0x8d/0xc0 [ 228.494655][T10316] ? netlink_unicast+0x710/0x710 [ 228.494671][T10316] sock_sendmsg+0xd7/0x130 [ 228.494685][T10316] ___sys_sendmsg+0x803/0x920 [ 228.494700][T10316] ? copy_msghdr_from_user+0x440/0x440 [ 228.494722][T10316] ? __kasan_check_read+0x11/0x20 [ 228.494745][T10316] ? __fget+0x384/0x560 [ 228.555717][T10316] ? ksys_dup3+0x3e0/0x3e0 [ 228.555741][T10316] ? __fget_light+0x1a9/0x230 [ 228.555756][T10316] ? __fdget+0x1b/0x20 [ 228.555775][T10316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.555793][T10316] __sys_sendmsg+0x105/0x1d0 [ 228.555807][T10316] ? __sys_sendmsg_sock+0xd0/0xd0 [ 228.555832][T10316] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 228.555850][T10316] ? do_syscall_64+0x26/0x760 [ 228.575233][T10316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.601026][T10316] ? do_syscall_64+0x26/0x760 [ 228.605726][T10316] __x64_sys_sendmsg+0x78/0xb0 [ 228.610506][T10316] do_syscall_64+0xfa/0x760 [ 228.615028][T10316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.620930][T10316] RIP: 0033:0x459a29 [ 228.624832][T10316] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.644453][T10316] RSP: 002b:00007f2d8d538c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 228.650982][T10327] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 228.652874][T10316] RAX: ffffffffffffffda RBX: 00007f2d8d538c90 RCX: 0000000000459a29 [ 228.652884][T10316] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 06:59:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x3, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:34 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 228.652893][T10316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.652901][T10316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d8d5396d4 [ 228.652917][T10316] R13: 00000000004c7953 R14: 00000000004dd368 R15: 0000000000000004 06:59:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r2, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 06:59:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) accept$nfc_llcp(r0, 0x0, &(0x7f0000000540)) openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x10) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) openat$full(0xffffffffffffff9c, &(0x7f0000000780)='/dev/full\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f0000000880), &(0x7f0000000700)=0xffffffffffffff73) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000101], [0xc1]}) ioctl$KVM_GET_LAPIC(r4, 0x8400ae8e, &(0x7f0000000140)={"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"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x4, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:34 executing program 5 (fault-call:1 fault-nth:4): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 228.932893][T10346] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 228.999529][T10354] FAULT_INJECTION: forcing a failure. [ 228.999529][T10354] name failslab, interval 1, probability 0, space 0, times 0 [ 229.034578][T10354] CPU: 0 PID: 10354 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 229.042185][T10354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.052307][T10354] Call Trace: [ 229.055633][T10354] dump_stack+0x172/0x1f0 [ 229.059985][T10354] should_fail.cold+0xa/0x15 [ 229.064582][T10354] ? fault_create_debugfs_attr+0x180/0x180 [ 229.070396][T10354] ? ___might_sleep+0x163/0x2c0 [ 229.075244][T10354] __should_failslab+0x121/0x190 [ 229.080185][T10354] should_failslab+0x9/0x14 [ 229.084675][T10354] kmem_cache_alloc_node_trace+0x274/0x750 [ 229.090467][T10354] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 229.096428][T10354] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 229.102224][T10354] __kmalloc_node_track_caller+0x3d/0x70 [ 229.107842][T10354] __kmalloc_reserve.isra.0+0x40/0xf0 [ 229.113198][T10354] __alloc_skb+0x10b/0x5e0 [ 229.117598][T10354] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 229.123127][T10354] ? __local_bh_enable_ip+0x15a/0x270 [ 229.129194][T10354] ? __dev_queue_xmit+0x17cb/0x3720 [ 229.134392][T10354] ? __local_bh_enable_ip+0x15a/0x270 [ 229.139764][T10354] netlink_ack+0x25c/0xb50 [ 229.144175][T10354] ? netlink_sendmsg+0xd60/0xd60 [ 229.149105][T10354] netlink_rcv_skb+0x376/0x450 [ 229.154124][T10354] ? nfnetlink_bind+0x2c0/0x2c0 [ 229.158960][T10354] ? netlink_ack+0xb50/0xb50 [ 229.163535][T10354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.169771][T10354] ? ns_capable_common+0x93/0x100 [ 229.174780][T10354] ? ns_capable+0x20/0x30 [ 229.179096][T10354] ? __netlink_ns_capable+0x104/0x140 [ 229.184456][T10354] nfnetlink_rcv+0x1ba/0x460 [ 229.189034][T10354] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 229.194490][T10354] ? netlink_deliver_tap+0x254/0xbf0 [ 229.199770][T10354] netlink_unicast+0x531/0x710 [ 229.205926][T10354] ? netlink_attachskb+0x7c0/0x7c0 [ 229.211024][T10354] ? _copy_from_iter_full+0x25d/0x8c0 [ 229.216390][T10354] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 229.222106][T10354] ? __check_object_size+0x3d/0x437 [ 229.227293][T10354] netlink_sendmsg+0x8a5/0xd60 [ 229.232049][T10354] ? netlink_unicast+0x710/0x710 [ 229.236973][T10354] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 229.242506][T10354] ? apparmor_socket_sendmsg+0x2a/0x30 [ 229.247952][T10354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.254193][T10354] ? security_socket_sendmsg+0x8d/0xc0 [ 229.259640][T10354] ? netlink_unicast+0x710/0x710 [ 229.264570][T10354] sock_sendmsg+0xd7/0x130 [ 229.268973][T10354] ___sys_sendmsg+0x803/0x920 [ 229.273636][T10354] ? copy_msghdr_from_user+0x440/0x440 [ 229.279089][T10354] ? __kasan_check_read+0x11/0x20 [ 229.284637][T10354] ? __fget+0x384/0x560 [ 229.288779][T10354] ? ksys_dup3+0x3e0/0x3e0 [ 229.293187][T10354] ? __fget_light+0x1a9/0x230 [ 229.298198][T10354] ? __fdget+0x1b/0x20 [ 229.302252][T10354] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.308925][T10354] __sys_sendmsg+0x105/0x1d0 [ 229.313534][T10354] ? __sys_sendmsg_sock+0xd0/0xd0 [ 229.319203][T10354] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 229.324652][T10354] ? do_syscall_64+0x26/0x760 [ 229.329321][T10354] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.335397][T10354] ? do_syscall_64+0x26/0x760 [ 229.340076][T10354] __x64_sys_sendmsg+0x78/0xb0 [ 229.344834][T10354] do_syscall_64+0xfa/0x760 [ 229.349337][T10354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.355337][T10354] RIP: 0033:0x459a29 [ 229.359220][T10354] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.378819][T10354] RSP: 002b:00007f2d8d538c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 229.387247][T10354] RAX: ffffffffffffffda RBX: 00007f2d8d538c90 RCX: 0000000000459a29 06:59:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1100, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 229.395293][T10354] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 229.403249][T10354] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 229.411206][T10354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d8d5396d4 [ 229.419162][T10354] R13: 00000000004c7953 R14: 00000000004dd368 R15: 0000000000000004 06:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x5, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r2, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 06:59:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1200, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x7, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:35 executing program 5 (fault-call:1 fault-nth:5): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 229.684448][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 229.684488][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 229.696154][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:59:35 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1300, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x8, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 229.841763][T10386] FAULT_INJECTION: forcing a failure. [ 229.841763][T10386] name failslab, interval 1, probability 0, space 0, times 0 [ 229.887707][T10388] validate_nla: 3 callbacks suppressed [ 229.887718][T10388] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 229.995843][T10396] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 229.995872][T10386] CPU: 0 PID: 10386 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 230.013728][T10386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.023811][T10386] Call Trace: [ 230.027128][T10386] dump_stack+0x172/0x1f0 [ 230.031486][T10386] should_fail.cold+0xa/0x15 [ 230.036104][T10386] ? fault_create_debugfs_attr+0x180/0x180 [ 230.041963][T10386] ? ___might_sleep+0x163/0x2c0 [ 230.046844][T10386] __should_failslab+0x121/0x190 [ 230.051801][T10386] should_failslab+0x9/0x14 [ 230.056321][T10386] kmem_cache_alloc_node_trace+0x274/0x750 [ 230.062149][T10386] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 230.068153][T10386] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 230.074004][T10386] __kmalloc_node_track_caller+0x3d/0x70 [ 230.079637][T10386] __kmalloc_reserve.isra.0+0x40/0xf0 [ 230.079653][T10386] __alloc_skb+0x10b/0x5e0 [ 230.079668][T10386] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 230.079683][T10386] ? __local_bh_enable_ip+0x15a/0x270 [ 230.079697][T10386] ? __dev_queue_xmit+0x17cb/0x3720 [ 230.079708][T10386] ? __local_bh_enable_ip+0x15a/0x270 [ 230.079734][T10386] netlink_ack+0x25c/0xb50 [ 230.089539][T10386] ? netlink_sendmsg+0xd60/0xd60 [ 230.089564][T10386] netlink_rcv_skb+0x376/0x450 [ 230.089583][T10386] ? nfnetlink_bind+0x2c0/0x2c0 [ 230.100500][T10386] ? netlink_ack+0xb50/0xb50 [ 230.100521][T10386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.100535][T10386] ? ns_capable_common+0x93/0x100 [ 230.100553][T10386] ? ns_capable+0x20/0x30 [ 230.151397][T10386] ? __netlink_ns_capable+0x104/0x140 [ 230.157387][T10386] nfnetlink_rcv+0x1ba/0x460 [ 230.161971][T10386] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 230.167433][T10386] ? netlink_deliver_tap+0x254/0xbf0 [ 230.172720][T10386] netlink_unicast+0x531/0x710 [ 230.178886][T10386] ? netlink_attachskb+0x7c0/0x7c0 [ 230.183989][T10386] ? _copy_from_iter_full+0x25d/0x8c0 [ 230.189370][T10386] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 230.195083][T10386] ? __check_object_size+0x3d/0x437 [ 230.200281][T10386] netlink_sendmsg+0x8a5/0xd60 [ 230.205037][T10386] ? netlink_unicast+0x710/0x710 [ 230.210048][T10386] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 230.215760][T10386] ? apparmor_socket_sendmsg+0x2a/0x30 [ 230.221228][T10386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.227568][T10386] ? security_socket_sendmsg+0x8d/0xc0 [ 230.233035][T10386] ? netlink_unicast+0x710/0x710 [ 230.237980][T10386] sock_sendmsg+0xd7/0x130 [ 230.242419][T10386] ___sys_sendmsg+0x803/0x920 [ 230.247099][T10386] ? copy_msghdr_from_user+0x440/0x440 [ 230.252564][T10386] ? __kasan_check_read+0x11/0x20 [ 230.257588][T10386] ? __fget+0x384/0x560 [ 230.261741][T10386] ? ksys_dup3+0x3e0/0x3e0 [ 230.266167][T10386] ? __fget_light+0x1a9/0x230 [ 230.270856][T10386] ? __fdget+0x1b/0x20 [ 230.274928][T10386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 230.281164][T10386] __sys_sendmsg+0x105/0x1d0 [ 230.285744][T10386] ? __sys_sendmsg_sock+0xd0/0xd0 [ 230.290778][T10386] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 230.296328][T10386] ? do_syscall_64+0x26/0x760 [ 230.301014][T10386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.307100][T10386] ? do_syscall_64+0x26/0x760 [ 230.311777][T10386] __x64_sys_sendmsg+0x78/0xb0 [ 230.316547][T10386] do_syscall_64+0xfa/0x760 [ 230.321057][T10386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.326962][T10386] RIP: 0033:0x459a29 [ 230.330852][T10386] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.350464][T10386] RSP: 002b:00007f2d8d538c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 230.358866][T10386] RAX: ffffffffffffffda RBX: 00007f2d8d538c90 RCX: 0000000000459a29 [ 230.366825][T10386] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 230.374800][T10386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.382852][T10386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d8d5396d4 [ 230.390812][T10386] R13: 00000000004c7953 R14: 00000000004dd368 R15: 0000000000000004 [ 230.404526][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 230.411354][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:59:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x9, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r2, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 06:59:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1400, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:36 executing program 5 (fault-call:1 fault-nth:6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000003c0)={0x101ff, 0x4, 0x1000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r2 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000240)={{0x1, 0x2, 0x8, 0x6, '\x00', 0x45}, 0x2, 0x10000000, 0x44, r3, 0x2, 0x0, 'syz0\x00', &(0x7f0000000200)=['{[:ppp1wlan0security\\mime_typesystem/vmnet0\x00', 'selinux^\x00'], 0x35, [], [0xfffa, 0x2, 0x9, 0x8001]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000140)="abd3926d961641ba4278", 0xa, 0x60021, &(0x7f0000000180)={0xa, 0x4e21, 0x7, @empty, 0x200}, 0x1c) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:36 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 230.749088][T10405] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0xa, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) 06:59:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r2, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 230.959877][T10421] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0xc, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 231.071593][T10433] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x1d, &(0x7f0000000080), 0x4) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000140)={@multicast2, @empty, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@ipv4, @empty, @ipv4={[], [], @multicast2}, 0x1fd, 0x0, 0x8, 0x100, 0x31e3, 0x100000, r3}) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 06:59:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) recvfrom(r2, &(0x7f0000000140)=""/254, 0xfe, 0x1000, &(0x7f0000000240)=@l2={0x1f, 0x263, {0x4, 0x3, 0x1, 0xbb, 0x4, 0x5}, 0x81, 0x8}, 0x80) r3 = socket$netlink(0x10, 0x3, 0xf) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) connect$llc(r4, &(0x7f0000000400)={0x1a, 0x18, 0x1, 0x1, 0x89, 0x0, @remote}, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) [ 231.385932][T10452] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:37 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x10, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 06:59:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x900) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fc) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 231.753836][T10476] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x22, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4b00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x100000001, 0x40000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xf8, r3, 0x908, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xe4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6dc2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8804}, 0x10) signalfd(r2, &(0x7f00000001c0)={0x100080000}, 0x8) [ 231.864951][T10483] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 06:59:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x240, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 232.012397][T10495] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:38 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x400000, 0x100) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x6) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000200)=0x400) 06:59:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x501, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 232.642044][T10514] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x4e23, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, 0x0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) r3 = getpgrp(r2) r4 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000), 0x4) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r5, 0x100, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000c040}, 0x40050) r6 = syz_open_procfs(r3, &(0x7f00000002c0)='loginuid\x00') r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40000, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r7, 0x29, 0x45, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000200)=0x1e) getdents(r6, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getdents64(r6, &(0x7f0000000140)=""/140, 0x8c) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r13, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000006600070500"/20, @ANYRES32=r13, @ANYBLOB="0000ffff0200ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x8, 0x4, 0x5, 0x1, 0xda, 0x1, 0x80000001, [], r13, r15, 0x0, 0x1}, 0x3c) 06:59:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, 0x0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) [ 232.945656][T10541] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:39 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x40000, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, 0x0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f00000001c0)="8f308dba1bcfe04fb54fe30099320aaff74aa0dc377c030b9bc78e39881d092ca5d26afcfa32b56a8a43c1227089cf0afd1bc690129dccbb310e3b1ef3bae793325976b6dcb0761a86db54f7e25b6afe6ef1c38065cd7da2d95f9bf6a7ed8cc58aa1ad2ed60d6c880c9ed14b61971b8b1055ff159c467b4fc557a2f4427f6ce79ac11d8434219c9d26f2ed5f65659bb9509611366c52ee45ecac6cd648c923328493e4934afa0f8717661f108ffb4566cc58b1a436244a48c321484995ce1daa6e20439b785f87fceae529fffcebd5530e781cea1c52851ff3cd5ce4", &(0x7f00000002c0)=""/54, 0x8489b1dba2ea25}, 0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000140)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0xfffffffe, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 233.611184][T10564] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:39 executing program 2: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x220800, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000180)={0x5, 0x5, 0x3ff, 0xfffffffffffffffe, 0x7}) ptrace(0x10, r0) r2 = syz_open_procfs(r0, &(0x7f0000000140)='\xca\xb3\x9c\xbeFe`\xca\x00') getdents(r2, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f00000017c0)={{0x1, 0x0, @reserved="e8c1c9b203056358bfdafb8419d376800201b535976b04d5b3f2cb3ccacae370"}, 0x45, [], "5eda7cd3ee6e4abfb0356901a647d7c29db830497d2e3d177c50e9d3406ecb1183465afda319b2d5f4d8d608c9d6c2e8c9d8e9f7b88f996c752f220096f5e624052f1418bd"}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001740)={&(0x7f0000000200)={0x150c, 0x8, 0x3, 0x2, 0x70bd2b, 0x25dfdbfc, {0xd, 0x0, 0x2}, [@nested={0x184, 0x41, [@typed={0x10, 0x93, @str='/dev/hwrng\x00'}, @generic="0ca0e8c4356820e8a685973e32d3d2c4445265c0aceafa34d79023a468dd0b09589efb68b88217f43325f6a3dbffa920c2185db093ae7f7c9ddd2bb62ac6ae3e040d0801e7f23926cc9eedf819a5f666a978d076136b1bf6555a5b51ed2dba778dfb34dc817fdafa9d969a386af7c1ec4ae5574f0e9c4219", @generic="749b751b32c9d2da64868d764333acb8cc2cf99581b0598167d7d09dcd51c34a4d425ec0f3b690eb3cc02013c34f5c2cb4269a8b2350e8bed7d8bf9f262fed2f4576e3f7060a3dca74a63d2950f219e79c34e1b90ea8cde45d174881de3c40a10f2731ee509f2fd264c45818659d6904704dace4e0918ca7e07f48e56e29e2020afa69e3", @typed={0x8, 0x22, @pid=0xffffffffffffffff}, @generic="12fa8c2d69ceab8dcd043c26871f19ecd2f117360b942bec814e249549b2515ae01d4a5bf49e0620cc8a6462df7c20982e38168a56da2992bc7e8a02687e1c96ab8acadc63ff5705faaf8b7a335284a1af6c397489d3c940297c2ce4ed808f1eb34c98d3ed32975558cc26b2"]}, @typed={0x8, 0x41, @ipv4=@remote}, @nested={0x10d4, 0x19, [@generic="09b019dd6fd3d0bc1cca2ebc0421", @generic="efafed6139a13d300d42d9ed8251f5603fc702f63d3ffc7f4bb282a75be12297657faa9a2dabb6094ed7e4ebf3718a212d4fe773da4a0228f4fc06412df66717b125e340ac", @generic="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", @generic="c7e08d971acdf580cc7ea1bbde5b108acdf2c9d141a449d232d984cb9c124bf1f273794b11d46c7f951d6949a7ec068fb2351bfae7061ca898fa38ac7bcc54718da7b573225b026bf2be43fcdb81619175406e851e1d08a3b1e2d5c778b7fac5aaaa9075346c45e0e0e65265a9e00a17fa0083d269dfaf140596", @generic="561668"]}, @nested={0x298, 0x35, [@generic="6f3187f238df2d1904d57bc46d9f0bcd7a0e3157f709f3e76d9e8ce76c0182579d4b9a51333d3905db0ec9bbbd0cc8a0c3da2ff0cc04c1688de4e81ea36a5b2b090697acbe1aca118b4f2db08a9003ac700aad", @generic="cd3b637a078b8ca7fefe053c1b6c6430f73eb34219679a35579ce2289a6ef16f007df2642a317366bbc758865acb3065b304f4ca537c6abd358868d3401a26f102000db23d090493152b73ca5260cff0a68d90df1f42d2dd4f96182575bbf4fa592d4b4cf270b5a6a6056f5e84e7fce51c90170e67d12da96ec21b9b7204beaa39fc2fa6552a834b4106882e52a6cdf575ec49282492b34a05eac100f0b7961c9c2503ee00a1643496c371ff2c7634f932afaea15dc98a6efe647df11d9dc15be5b39f8b65f9f5", @generic="b02c85ebe7a3843ae9868fca73b00d969566d0dcaa5f42da62264677a9e11bfc86e55f4b8b124e27f795dd448869f405a89e62c70077d7e9e428d1c87a2b31ba18b3e5b0fe8b43a5be22d2baae1579836a88bc9858c8dc48e6fba8d9c8da657d51dd3e294e103a63e0fd7fa2b07aef231347dba8708f3571c8f26de47857915e9df276362688ab179491a0f9485244f4693af3", @generic="103b149374eba01b12061335d63f78ccc5f43c7eae792596e021cc50eb1b02cada9d5c96af23af89b9f98f0d64434663f30b2f082b21c6969633f8fba79eb7a161f58267916e39a050959cf61ceb9e9d3944bdfe26ad1d3088075018b49f988ffb9da16ce55aa40ccf8fdabe5fa3bcde63886482612c72aca17a3e5abcfa2053e8641bcfd8f47354ba259195eaa2468a0f57dff988807bfff884854b11190599e95ad311e7bb3ceabd633730919ba62e90dcbe5fec3e6886", @typed={0x8, 0x5, @u32=0x1}, @typed={0x8, 0x90, @ipv4=@multicast2}, @typed={0xc, 0x67, @u64=0x7}, @typed={0x8, 0x5, @u32=0x2}, @typed={0x8, 0x29, @u32=0x2}]}]}, 0x150c}, 0x1, 0x0, 0x0, 0x20004000}, 0x810) getdents64(r2, &(0x7f0000000080)=""/140, 0x8c) 06:59:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000003, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 233.860513][T10583] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:40 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000004, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000080)=""/140, 0x8c) 06:59:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x2, 0x20000) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @empty}}}, 0x84) 06:59:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000005, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000007, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:41 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x76, &(0x7f0000000080)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x10000}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)={r5, 0xb, "66b281715bd073321194b5"}, &(0x7f0000000200)=0x13) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 235.406049][T10639] validate_nla: 3 callbacks suppressed [ 235.406060][T10639] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000008, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0xfffffeb9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0xf30ac30e1ef9948e, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x5, 0x10000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 235.523937][T10651] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@empty, @empty, @loopback}, &(0x7f0000000140)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 235.683968][T10664] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000009, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) [ 235.839231][T10671] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:42 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x80000000000a, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x11, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000180)={0x2, 0x80}) [ 236.336466][T10697] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x12, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x90763, 0x0) 06:59:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x80000000000c, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 236.453932][T10706] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x13, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 236.614612][T10720] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:43 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000010, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r1) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000240)=""/4096, &(0x7f0000000140)=0x1000) 06:59:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 237.256641][T10739] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000022, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3c, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400000) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [{0x20, '\xc3vmnet0wlan1!lo-'}], 0xa, "956b5c8adf7a2f2ef72f87d52295cac88a380730cb706ea24272a7bebfb7fbe78790a5a1f38ba717d4fad3230c1d416e59cdf15f305eaa65e29cb1a2f51f33c9ace40c4fa10a6e4c987ed55f30350d2199f014819c7be14f8969e733af52cfc6ed252b11140b6a9650da92339bf32b12a6216832d2e3dcc997ae62c47daebf8450a0222553eb3de8b6c521495f5727e6a47f2b90439cbcc1a8437b"}, 0xb7) setsockopt$ax25_int(r1, 0x101, 0x3, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 237.374126][T10748] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 237.509956][T10759] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:43 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(r0, &(0x7f0000000140)='./file0\x00', 0x800) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000240, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:43 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) [ 238.156842][T10778] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:44 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 238.226914][T10788] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000501, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:44 executing program 2: mq_open(&(0x7f0000000280)='net\x00', 0x40, 0x4, &(0x7f0000000240)={0x88, 0x9, 0x7, 0x5e, 0x2, 0x80, 0x2, 0x1}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0xbec70b96b62817da, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r10 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x9, 0x7fff}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = creat(&(0x7f0000000200)='./file0\x00', 0x0) getdents64(r13, &(0x7f0000000140)=""/140, 0x30) [ 238.456416][T10800] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 238.673194][ T26] audit: type=1804 audit(1569740384.490:34): pid=10812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir544916144/syzkaller.3Mbhvx/92/file0" dev="sda1" ino=16843 res=1 06:59:44 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:44 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000004e23, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000140)={0x6, 0x5, 0x80000000}) [ 239.038472][T10821] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000040000, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x8000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000140)=0x1c6) r3 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 239.150701][T10829] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:45 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000c40)={0x20, 0x2, 0x8, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000002400)={&(0x7f0000000140), 0xc, &(0x7f00000023c0)={&(0x7f0000000180)={0x2214, 0xe, 0xee747b62deb175ea, 0x800, 0x70bd2d, 0x25dfdbfc, {0xc, 0x0, 0x6}, [@generic="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", @nested={0x1050, 0x5f, [@generic="0d9634", @typed={0x8, 0x26, @ipv4=@rand_addr=0x10001}, @generic="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", @typed={0xc, 0x7a, @u64=0x4}, @typed={0xc, 0x68, @u64=0xffffffff}, @typed={0x8, 0x4d, @u32=0x9}, @typed={0x14, 0x2b, @ipv6=@dev={0xfe, 0x80, [], 0x12}}, @typed={0x8, 0x6a, @fd=r0}, @typed={0x4, 0x80}]}, @generic="cea6f49bbbe18192fff4836681d1b5ac1468ce4abe1c2478914186f94585c91a8f00eeadae3d96a216241e0797626d3b392bec6038d3ac78da46193d043b9980f5f01d033b173a8125f6534a6fca4081838739a6d93d811e9e2bfa2d3b86263873c26d751ddb41fb11e73104242870a47865768ab6bb26f4b1dc53fc166167d95c0bdf938868cdf0d5b1cc1c554bb54005d8b5d50722904036e00a47b4160d07370417643626ca04f0f76ca57fbfa31308d1001d12870ef13afd2e5fe7de525799ed7932a60a105dd617ae59a4ea7c4d2b0540081aff917a075ba6", @typed={0x8, 0x42, @str='net\x00'}, @typed={0x8, 0x2a, @fd=r0}, @generic="a05b45d93c49aebf04f06a5139d4f24c9ed4f3580cdc339ed56a84a4c7dd0623f884436253635f89e9c01e6cef90059d64203f1422e7a52aeab85a6e1e38bc158833d014b1a5c60b706371333f9fef9818c2020e172819e3fcee7259d85783ca083fefea3a45a3b33e3d50de44d1a8652b3495de4f008c9b23b0b6ced13720b6d010567a5ad5a84b4a6432c5f43fac2f7b57748ef5a9f390463fefa453f6cc36fc32a2b084c427ec37ea6ee13d42189bec47a709e47717c6ab799ca849d31b3d7c2d"]}, 0x2214}, 0x1, 0x0, 0x0, 0x497c57d6c9415955}, 0x24000810) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x8000fffffffe, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0x63, 0x14, 0x14, 0x28}}, 0x10) 06:59:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 240.049891][T10871] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000380)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) getdents(r2, &(0x7f0000000180)=""/233, 0xe9) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) setsockopt$inet_buf(r4, 0x0, 0x20, &(0x7f00000003c0)="00facf40f851a3203eb0d48aaed956fd2769ba459ace30b3bf87105fdd4263f412cd35a9f8a694927573066a2aec35d3855cf6b00c08b0acd4d28dbddb572d0ff5a7b708fea484a7a7ffb43f11b5", 0x4e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$packet(0x11, 0x2, 0x300) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x200000, 0x0) sendmsg$kcm(r8, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000480)="69faea4d9fbf34079502815468bec391318fc034133e51245c5542ec780fc4b9bacd682be6b799a1fe1af844b089d083d7d1c04ce270c4ea3afa82d0e02a", 0x3e}, {&(0x7f00000004c0)="b0527954a47743093196c4eb487b30c858f1d96767d900c1826944f62d381bf520225a49030bdf6370b55682698d03bfe72c52c9fec4f3cfa89a823608b6b99eabd4d6af2b7e767cbf5675e2dc7a331ee0ce7bd50002ca15fa0422f872c61e08e9ea2a194d1f34fdcef7d65caaa6819db3b35f3823548fc3acd925f460c14ccb1f28fb420f45e6ef5c78044b13deec4cc561f06e617e99cf9ba82a0ee2f7bd05b56f11081cc341e1ee", 0xa9}, {&(0x7f0000000580)="3cb4", 0x2}, {&(0x7f00000005c0)="0fd44039a844bd867162964b0a6d11c08f509c39f48de8365bc49b272dd433f8e357f0b0a32bde7f187b7a3e8745d10a7a2b51c581829c92e5dce3a28477f74a7149a2166fcb4fc25fd9d568d316e9c28b956a0d9b20c55b0f210af63f32ce6517c6134e932c1fa81d64b675f1885d37d2329d721c209c7423c5eb52b9edd05ecc685fcbcb2a625bb4ae412d22b4aa75094da293129843ca666b1e92c13f", 0x9e}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="f4a5fcea0064e2374498bad146dfc4819f465c03797b4c1e8deec7af7e98927544e82e3bf32dc43e420d59856c72e8d34ed39b076407041c7e6314caf811fda3072b4a632ca64cc24a41e1175516b622856943a9a3443f1b0be3e521fff842cb4f8ce9c62f7af014e624205a12f37e43e65aecba7ccfdca39c9c323a8d32c606df6ae5bddbf23570ae33de94c4bf5eaa0de9b0588d1cb2a7add4a391c1861cc41c453340abdd4c7ef85a8e375964e9889775c7715124d69c15a45edb36d3", 0xbe}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="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", 0xfc}, {&(0x7f0000002840)="4ba07da7a149ffc3d17c6c069b740bb3e3391e7ef9cd342d7a5094234803542829a1", 0x22}], 0x9, &(0x7f0000002940)=[{0xf0, 0x100, 0x4, "28574509da3fc751c6e15077b8b68046a6df709950a03111a48c0fa50946cedae41ab9661205b5f54d7797f0d53fdbbed0b35649fa28228749426a1f87aadbbb0e24a5f777673526a536d9fd1a508c95c04891c00248a8eea90479e69e4eff3e975a1df40d86dcf5297169c576d90eae368b261c54f7828eea7627d2fc5db0b0e5eb10cea791a2047335b6e5eddf69ed8546bde8b3b12977a8ab165bb6fe91aaa1c2ef87c2e5138a06d54f0bff727bf7a2e5ed009552f12431716409ded1906497e2d013b067e399b8e16b1a915052ab357614937af360c5b1"}, {0x70, 0x108, 0x9, "86058475a1aaa88cd3b1d364509c784a3e8d3e341d76d0b6f2d66f53035281b9efa7e41377fbb745c93a1c0397fff1a6c613cd9cf5e4996ea8955b4334fdfcb26bdb3ad2d46a62cd97f142314bd7f11779e04ad9d7ff40620483d4973629"}, {0xe8, 0x114, 0x3, "74f496cd5f310d313570be182092372fe0f4c5d9c9084660b45eca52eb691e667f0db99fdaac48ab57a6fa4777d8c5047b082b28a8912b0c431478dd7de4667a68f9b34315e77af2fed450903dd438f0a62a44164cfd61c443ee283eda0bb0553fbbcc427ffd921b5097592615dca6b5bb717cdd20bb4a3cc23573e6acfd29ab66eeb156fb406e333f8bf0fe2dc4eb328e4a640b9133b4d961077d6b1378b9e0fd3677c522b06e52b9b4d34ea221aeb50111731ea423aacbe9c7a567d68e99b54ed88bdc95051c861a39bcf81524fe3187472cae7b"}, {0xc8, 0x29, 0x200, "95da86667f9d7a5a0d243a96a6e6ced432654de42f100f9572ae7f06514fd4854c8728bf60cb0163de6c03a62cb73ab016b770f6b776170c743810df01e3aee797750c80a878e0b15490dbf77878c36fc5dc9484f465aebd5d5bef94ef70b5d9bbe4e9f95be875066c370026bf4f850113d46e523a8d726a6509773573ad360bf6b7d9d7948f21c78c9616e7de8496f38dbb0adad91b8629d6744f4f87456c2b94802a14abe26790bab702d12324fca7c49f623be7503c"}], 0x310}, 0x40) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r9 = accept$packet(r7, 0x0, &(0x7f0000000340)) fsconfig$FSCONFIG_SET_FD(r6, 0x5, &(0x7f0000000300)='\x00', 0x0, r9) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000280)) ftruncate(r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:59:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x4, 0x14, 0x28}}, 0x10) 06:59:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) write$binfmt_misc(r2, &(0x7f0000000140)={'syz0', "3eda33e4888cd422b28a095fc52c6013daae737c43aa3823a141e1008098f512a2c7c72a46c5b2958c784b3130e4084b80e3b1d2e684f89f73919a57406490eab239fc957d8218a500d050625ad63afe81d3b93985714fcec6b42b3f376b19f53d4cb5274df8e8caee5ed3ba7eb5f42b870d08a21c14263dcfd831"}, 0x7f) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 240.828677][T10909] validate_nla: 4 callbacks suppressed [ 240.828689][T10909] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x9, 0x14, 0x28}}, 0x10) 06:59:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="7b00000070410cb416c6206c3e53461e342182ef94755ae21ad0fd4f01bfd2039b8a14ffcf42f5b1e0259916daeabb6d4a290835b4e9530054821ef93d70640aaaa916042e7f0d2652896dd686fac49e69c7533832effa412bef293e30acac372497de9c9d31e7e89c40f44e7f3b8391839ebad53bad446e82d1e79cadd2d9"], &(0x7f0000000200)=0x83) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x16}, 0x10001}}, 0x0, 0x9, 0x2d9, 0x8000, 0x44}, &(0x7f0000000300)=0x98) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:59:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1100, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 241.116733][T10926] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x3c, 0x14, 0x28}}, 0x10) 06:59:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:59:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1200, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x63, 0x14, 0x28}}, 0x10) [ 241.390219][T10947] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x11000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:47 executing program 3: pipe(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:59:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1300, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r2, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 241.685672][T10963] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x4, 0x28}}, 0x10) 06:59:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x12000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:47 executing program 3: pipe(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:59:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1400, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 241.883681][T10983] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0xd3e, 0x3, 0xfff, 0x1f, 0x81, 0x2, 0x1, 0x4, 0x40, 0x4ad], 0x2, 0x4100}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x13000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x9, 0x28}}, 0x10) 06:59:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3c00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:48 executing program 3: pipe(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 242.139512][T10996] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x3c, 0x28}}, 0x10) 06:59:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x14000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:48 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x63, 0x28}}, 0x10) [ 242.500132][T11025] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) signalfd(0xffffffffffffffff, &(0x7f0000000140)={0x1}, 0x247) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x1d, &(0x7f0000000080), 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) getsockname$inet(r2, &(0x7f00000004c0)={0x2, 0x0, @remote}, &(0x7f0000000500)=0x10) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000240)={0x3, 0x8, 0x2c, "7e238fcbafa6af29dd35991867d97347877f90cf7711ec33435993f203f9dbd3362e4b3b6b0a06f90e0c14d09739b36bfc1b0757c36f955f292301c3", 0xa, "41ae98947d714b58694f364033cade1813f689736671dacec3274e147de2801af187c558d6dedd5ca22d4c5f1b56da3c42ffdf14a63ca42920ff04df", 0x30}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x2000, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x18}, 0xfff}, {0xa, 0x4e23, 0x8, @remote, 0x7db3}, 0xff, [0x0, 0xe70b, 0x0, 0x6c, 0x10001, 0x0, 0x80]}, 0x5c) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000003c0)={0x8, 0x0, [], {0x0, @reserved}}) setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000180)="d70a2818044a6bf00667bea887b2e1df3e9332b23ce7c492903039ffe047e9900e69c890b051e4a781fe4bc1b2fc3d0c89748ec75d9723369599adfe43d6e54d49453c565c9920e058841d947023ca9923de243f67b55efdba5cdf288164e189d92aebc4fd0ef42ba05801a1557843f7cc5725f11054662082f6ad97e94d316439c8b0a1828053a34f9f144e10fe62b85b83b893f803", 0x96) 06:59:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 242.634683][T11035] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x3}}, 0x10) [ 242.840177][T11046] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 242.899157][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x9}}, 0x10) [ 243.048124][T11064] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 243.188275][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:49 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f0000000180)=0x3) recvfrom$inet(r0, &(0x7f00000001c0)=""/97, 0x61, 0x2, &(0x7f0000000240)={0x2, 0x4e22, @multicast1}, 0x10) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) getdents(r0, &(0x7f0000000140)=""/42, 0x2a) 06:59:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) 06:59:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 243.403526][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 243.424494][T11087] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) 06:59:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_OPEN(r3, &(0x7f0000000240)={0x20, 0xfffffffffffffff5, 0x6, {0x0, 0x10}}, 0x20) r4 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x236000, 0x0) getdents64(r4, &(0x7f0000000080)=""/140, 0x8c) r5 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000000), 0x4) r6 = syz_open_dev$amidi(&(0x7f0000000900)='/dev/amidi#\x00', 0x1000, 0x20040) statx(r6, &(0x7f0000000940)='./file0\x00', 0x0, 0xfff, &(0x7f0000000980)) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) link(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00') r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) fcntl$getownex(r9, 0x10, &(0x7f0000000200)={0x0, 0x0}) sendmsg$nl_generic(r5, &(0x7f00000008c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x77542dc6c5164d1}, 0xc, &(0x7f0000000880)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRES32=0xee01, @ANYBLOB="14004a006a5df26174a87eb4ab703cc630c6a1977180a2fa55ed0c5249abfa15fdfa02fab3583bd0d24b87c889da1962f76a4cabeb738357e6bce76e9975485bebec360780176a90258c023f44ae83fd8651d72ffc8b0e19a2e00b62bf804876352a8e3f36641dd4c8dad1bb227997a014a385a209af2a0a8f516d16bfe4a05a1efc091952ed6cbc716ba188b669e62cc6a2195763cb295ab6dc7b2f3f7080fdc63974c02824afb2549ecd1609791f1ac744ab2c522b1acd0b77a086edae996a467af34e0579f887e2a100e8002c00de912fcad5bbebcc76c3176fa41ef1a82ea937964c6f94ed4109abd0646253eb69cbcea209a039a837dd7077fbb28255928f37c3f629e706cc86f32714004000fe8000000000000000000000000000bb6f33d5db5754ad390147e6e4b9dc6a4a6bde8207607323a3fed81e96722af79802a75c978c52df09cbd58a4ed0cdbda5e957b26043a2d875651b4253a623eedfeee259dbffdaff53fc5e163ecd68809ee2e62c6bce2d1fda3790b8c5958a552c54a77186978a06538822b89865f2c9b0d048827a0854b4705bbf54bdc5a659ecb0c71f7afb6416dafcbbdae8f34c949b3b2f000000024200080018006e65740001da85872919609b870adf68d08c2b2e1421bfccc10dfaef11eb4f4badea44dd66e1d8dfcc3b4563d63987b02e2a415545e284372a678b543adbea61792b06702aab3cbf02778635e5cf80b3179d04d4a475f4c8b65c1ae7c1263d8d80b6ffde9b128e9348e54ab9e0eb4f6d73aea134408d4a101d0864290ce253724348f797bffbf862eb8b824a50453cfaea13d38bb575d4c21053a41780f319c6b3906d54b580863b2e92715ba14e524c239116147bb3e0e02e6681865aaa09dc408e1f646f08002100e000000107fe67110cbb34b981896c1e01804b57fd0955ddea3718f7a9f7ef25f39f9be64ab2cddd117059af0a0973a2fb77d926108e4051ee11b6767b0694ee33d552489c460eb9bbb98313f9bbbef8e8a07fc347822bf427b5b305a6ae79139e94435c071e3dbc432910ad48d952d9f3aae4af9b41a387a61b7f8717b3a446d37ba14bc3acb110f24f827a83eb49783afa3f18063ba4dcda84eecee798f978f1f01375a2b28133b13a8e786218829cdc089be23dec5daf7370f3cef5da845c137cf12e753073f3146de015da88083224d21a9f12a89d18962d16c48aebe734f2b8aa00c4e8566192823fab5de934370600fb607f5936e841a289258432c9a04e6b86b86716ebe39e10118cc95f36bdae6dc4a35069bf1c785c59fed23a43d4f27bece94408006600", @ANYRES32=r10, @ANYBLOB="000032d5893d4e7a170d28d8484ee4368b544ef811dd40fc49d61408357f0567d7d6766cfc93a97770a73c94fd74d5e5bc192da7faa5c67257d6d3009fc61781355bfd52fa83e2f597fb49f29196b2553df1fccda00474fdc3978010ce6addd99a86bd356e6f73138c36d9ec2177191dc4984d5cee686a346404f09c21b36ed38b58e95cf21cfe5d96ea7722015badc34c1f99d3d84a4a1846d17db44c19d8a3d5c7f66e7fc56fdfd90096c07a3f952b862ae38d5e16"], 0x640}, 0x1, 0x0, 0x0, 0x800}, 0x20040800) 06:59:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4b000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) [ 243.565966][T11098] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 243.727158][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:50 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x1be) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x63}}, 0x10) 06:59:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 244.343231][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000080)=""/140, 0x8c) 06:59:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 244.433358][T11138] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 244.601859][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:51 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2dc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x2, @remote, 'caif0\x00'}}, 0x1e) getdents64(r0, &(0x7f0000000080)=""/140, 0x2ef) 06:59:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, 0x0, 0x0) [ 245.242521][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, 0x0, 0x0) 06:59:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000140)=""/184, &(0x7f0000000200)=0x8) r2 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)=0x5, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 245.389977][T11182] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 245.529277][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:51 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, 0x0, 0x0) 06:59:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000140)={0xdc9, {{0x2, 0x4e21, @empty}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000200)=""/30, 0x1e, 0x40010000, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e21}, 0x6e) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) socket$inet_udplite(0x2, 0x2, 0x88) 06:59:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 246.183265][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 246.203165][T11214] validate_nla: 7 callbacks suppressed [ 246.203177][T11214] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 246.264318][T11224] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') r1 = socket$packet(0x11, 0x2, 0x300) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000140)=0x6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) fsetxattr$security_capability(r1, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x5, 0x6}, {0xdd01, 0x81}], r2}, 0x18, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='\x04\x00\xf3\x7f\xff\xff\xff\x17l\x00', 0x367940, 0x0) r6 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x0, 0x2) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB="280047a59403000014de00"/20, @ANYRES32=r8, @ANYBLOB="08000200ac1414aa0800080085050000"], 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000380)={r6, r9, 0x80, 0x37, &(0x7f0000000340)="721658655ed2ea3672b2758e93b0b153bfe5b02aca241addf10126f88e1ca2755ba1689ed2e3f2d87e7d1fbcd60447f3c20a1ac8b73f0e", 0x2, 0x7, 0xefd, 0xffff, 0xc6, 0x1, 0x17f9, 'syz1\x00'}) getdents(r5, &(0x7f00000002c0)=""/47, 0xfffffffffffffe3b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 246.503625][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 246.532377][T11240] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:52 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x8000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 06:59:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r1, &(0x7f0000000080)=""/140, 0x8c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) 06:59:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 247.089250][T11258] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 06:59:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 247.199651][T11268] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x178, r1, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xf922735b71481638}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffff}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x61}}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa5ba6f7623201fd1}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x4}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x44081}, 0xa9a3f7e0e02a68b9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x6e, 0x1, 0x3, 0x7, 0x3, 0x7, 0x7, 0x1, 0xcc, 0x4, 0x5, 0xfbf, 0x8, 0x5d51, 0xafe4], 0xd000, 0x10000}) 06:59:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 247.342631][T11276] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:53 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:59:53 executing program 2: ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x99) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 247.970143][ C0] net_ratelimit: 2 callbacks suppressed [ 247.970154][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 248.005046][T11302] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x600002, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 248.070182][T11305] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 248.257785][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 248.266710][T11318] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 06:59:54 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 06:59:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x40030000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:59:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0xf8, 0x0, 0x1, 0x0, 0x6, @dev={[], 0x1a}}, 0x14) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 06:59:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffffffffffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 248.829343][T11335] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 248.861912][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, 0x0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 248.964960][T11350] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 249.027822][T11352] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 249.159777][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 249.302667][T11370] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x11000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, 0x0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:55 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 249.808058][T11377] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 249.811839][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, 0x0, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x12000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x300000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 249.924661][T11387] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x0, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 250.116888][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x13000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 250.335452][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x14000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x500000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 250.577594][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:56 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x0, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3c000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 250.865447][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x700000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 250.932960][T11443] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x0, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 06:59:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x800000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 251.143855][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 251.314548][T11462] validate_nla: 5 callbacks suppressed [ 251.314558][T11462] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:57 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x900000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 251.745912][T11472] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 251.844651][T11481] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 251.936662][T11487] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 252.075595][T11493] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 252.222595][T11503] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:58 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 252.696129][T11515] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1000000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 252.765003][T11520] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 06:59:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 252.913473][T11528] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1100000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x40030000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 253.169526][ C1] net_ratelimit: 6 callbacks suppressed [ 253.169536][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 253.190271][T11537] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1200000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 253.366585][T11547] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 06:59:59 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 06:59:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffffffffffff, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1300000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 253.550725][T11553] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 253.563341][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1400000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 06:59:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x2000000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 06:59:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 253.794392][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:59:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4000000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 06:59:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x300000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 253.938629][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:00 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4800000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 254.490968][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4b00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x500000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 254.727566][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4c00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x800000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6000000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 254.981074][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:01 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x900000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6800000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 255.372686][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6c00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xb00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7400000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xe00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 255.623015][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x7a00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:02 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1000000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9effffff00000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 256.349566][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 256.408094][T11676] validate_nla: 11 callbacks suppressed [ 256.408111][T11676] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1100000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 256.644625][T11689] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1200000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffff7f00000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1300000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 256.943136][T11701] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:03 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x1400000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xfffffffffffff000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_VERSION(r5, 0xc0106407, &(0x7f0000000280)={0x938, 0x7, 0x120, 0xfffffff7}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, r5}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3f, 0xc1, 0x6, 0x8, 0x0, 0x8000, 0x200, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xa07, 0x8, @perf_bp={&(0x7f00000001c0), 0xdb184c0d5d36d149}, 0x1100, 0x7, 0xfa6, 0x3, 0x5, 0x2, 0x9}, 0x0, 0x1, r3, 0x8) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000180)={r6}) [ 257.274301][T11718] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3c00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000003500)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000033c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/17, 0x11}, {&(0x7f0000001280)=""/26, 0x1a}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/243, 0xf3}], 0x6, &(0x7f0000003440)=""/162, 0xa2}, 0x14002) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) ptrace(0x10, r4) ptrace$peek(0x1, r4, &(0x7f0000000180)) bind$tipc(r3, &(0x7f0000000140)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x3}}, 0x10) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3f00000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 257.517180][T11734] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 257.673124][T11746] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:03 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4000000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 07:00:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) [ 258.165384][T11756] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x6000000000000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x200102) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) getpeername$inet6(r0, &(0x7f0000000140), &(0x7f0000000180)=0x1c) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) write$binfmt_elf32(r2, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x3, 0x8, 0x3, 0x100000001, 0x5ee59577a504bb3f, 0x6, 0x1, 0x93, 0x38, 0x3e0, 0x1, 0x0, 0x20, 0x1, 0x1ff, 0x8, 0x2}, [{0x162070660b83f7ce, 0xfca0, 0x8a7, 0x4, 0x8000, 0x0, 0x0, 0x5}, {0x4, 0x40f5, 0x1, 0x3, 0x1, 0x800, 0x5, 0x81}], "39dfc75ee516578f92510e90a32d09ce867f6741b7476ebcab5cd10b94b126da7f32acf752791a04d4c847ca7b005b06322a196f5bf8f6ac0aa4d33bc80950d13003438261db2a5dcfa781e5ad4f58ad4bb979e6b88f51e9f84ec53c6ba205a09503a10207d372b0faaaaa6aba849418bc2a8fe8c96ac5e756f5a68d5a815bf2a2ad324dafa31eb1a81c6c552c29615a5cdfd72d03af0aa94ecd1b9f89c532ea81d1c42506007c", [[], [], [], [], [], [], [], []]}, 0x91f) 07:00:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 258.362800][ C1] net_ratelimit: 7 callbacks suppressed [ 258.362810][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x9effffff00000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 258.442367][T11781] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 258.614705][T11790] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:04 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340), 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 07:00:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 259.025621][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 259.036860][T11803] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffff7f00000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) connect$rds(r3, &(0x7f00000010c0)={0x2, 0x4e23}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000001100)) 07:00:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="7b00000070410cb416c6206c3e53461e342182ef94755ae21ad0fd4f01bfd2039b8a14ffcf42f5b1e0259916daeabb6d4a290835b4e9530054821ef93d70640aaaa916042e7f0d2652896dd686fac49e69c7533832effa412bef293e30acac372497de9c9d31e7e89c40f44e7f3b8391839ebad53bad446e82d1e79cadd2d9"], &(0x7f0000000200)=0x83) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x16}, 0x10001}}, 0x0, 0x9, 0x2d9, 0x8000, 0x44}, &(0x7f0000000300)=0x98) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 259.256758][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffffff00000000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:05 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340), 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r2, r3, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xfffffffffffff000, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) [ 259.924068][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:05 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 260.164461][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 260.170373][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:00:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 260.223322][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 260.278890][T11872] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@fragment, 0x8) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000000900)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r4 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r4, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0xffffffffffffffed) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000001100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000010c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r7, &(0x7f0000001140)={0x6, 0x118, 0xfa00, {{0x4, 0x7f, "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", 0x4b, 0x80, 0x9, 0x1f, 0x5, 0x4a, 0x2}, r8}}, 0x120) close(r5) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r9, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x76, &(0x7f0000000080)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) r11 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r11, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r11, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000140)={r10, 0xa92}, &(0x7f0000000180)=0x8) 07:00:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:06 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340), 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 260.802591][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:06 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 261.193227][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 261.256413][T11918] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:07 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f320000", 0xb) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x80) socketpair$unix(0x1, 0xf, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECUREBITS(0x1c, 0x2) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 261.679806][T11934] validate_nla: 9 callbacks suppressed [ 261.679818][T11934] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 261.708341][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$ppp(r1, &(0x7f0000000140)="fa50d131d4799b4cedea3975ff0ebed97f613cca630cae0591e8da8d87a64c27c7c9b300d466a1af460d", 0x2a) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r2, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r2, &(0x7f00000001c0)=""/140, 0xfffffffffffffe8b) 07:00:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 261.740914][T11941] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 261.901952][T11951] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:07 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 262.113901][T11960] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 262.237873][T11967] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:08 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f320000", 0xb) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 262.607960][T11975] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 262.676889][T11981] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 262.911238][T11991] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:08 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 263.153365][T12001] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:09 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f320000", 0xb) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:09 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 263.486802][ C1] net_ratelimit: 5 callbacks suppressed [ 263.486813][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:09 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 263.565951][T12023] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 263.599035][T12022] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 263.749939][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:09 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 263.833131][T12036] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 263.970795][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 264.056361][T12050] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:10 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700", 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 264.369189][T12057] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 264.394840][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 264.500315][T12064] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 264.736095][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:10 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 265.061692][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700", 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 265.343236][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 265.421179][T12105] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 265.614410][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:11 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 265.956635][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:12 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700", 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) ioctl$KDDISABIO(r2, 0x4b37) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r6, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r7, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r7, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/174, 0xae, r7}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r1, 0x10, &(0x7f0000000380)={&(0x7f0000000180)=""/184, 0xb8, r8}}, 0x10) r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r9, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$BLKALIGNOFF(r9, 0x127a, &(0x7f0000000140)) getdents64(r9, &(0x7f0000000080)=""/140, 0x8c) 07:00:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 266.211760][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) fallocate(r1, 0x1, 0x967e, 0x8) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000340)=0x4911) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$inet_dccp_buf(r3, 0x21, 0x0, &(0x7f0000000180), 0x0) close(r2) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000280)={'broute\x00', 0x0, 0x4, 0x64, [], 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=""/100}, &(0x7f0000000300)=0x78) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 07:00:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 266.348926][T12151] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:12 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 266.805718][T12171] validate_nla: 9 callbacks suppressed [ 266.805729][T12171] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:12 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff02", 0x13) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 267.139565][T12183] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r0, 0x540c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x3f, 0x8, 0x5, 0x4}, &(0x7f0000000200)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) socket$inet(0x2, 0x6, 0x20) 07:00:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 267.218739][T12192] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:13 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 267.677153][T12215] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000180)='sit0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x10000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) 07:00:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:13 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff02", 0x13) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 268.008529][T12229] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:13 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000380)={{r1, r2+30000000}}, &(0x7f00000003c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r3, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x90, r5, 0x2, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xac7d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x23c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x30000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf1d6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x1}, 0x20008000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r3, &(0x7f0000000080)=""/140, 0x8c) [ 268.168256][T12242] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 268.252398][T12246] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:14 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0xd, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 268.581710][ C0] net_ratelimit: 6 callbacks suppressed [ 268.581723][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 268.599319][T12262] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x80010, r2, 0x0) r3 = socket(0x10, 0x4008000000803, 0x0) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000040), 0x4) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) fremovexattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:14 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff02", 0x13) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 268.980726][T12287] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 269.000936][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 269.103603][T12293] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:15 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:00:15 executing program 2: clone3(&(0x7f0000000380)={0x4000, &(0x7f0000000140), &(0x7f00000003c0), &(0x7f00000001c0)=0x0, 0x1, 0x0, &(0x7f0000000200)=""/185, 0xb9, &(0x7f00000002c0)=""/178}, 0x368) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net\x00') getdents(r1, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r1, &(0x7f0000000080)=""/140, 0x8c) 07:00:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 269.498562][T12302] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 269.515633][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 269.725298][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:15 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff0200", 0x14) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 269.891493][T12329] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 269.918361][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 269.983857][T12337] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:16 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:00:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:16 executing program 2: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r1, &(0x7f0000000040)=""/47, 0xfffffffffffffd38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/140, 0x8c) prctl$PR_SET_ENDIAN(0x14, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x88, 0x2, 0x3, "6737321f01b9420f4d1ff34659ff7ab7", "54835e7ffbd0a07a2117801a9542c716f65def9d4e7e772acec0d956631f8e5a5bb57f6329c510810bd1fdfd46ea4618b7068e50b665cfcced8cbfd187fdd3dd654cf48615db0b6b49ec64ba92294291af28a6b970a751d212b9660c1b5ffc93ae62073625299b0e9136a7ca6267580eb3ae9a"}, 0x88, 0x2) 07:00:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 270.413399][T12346] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 270.428451][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:16 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff0200", 0x14) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) sched_setscheduler(0xffffffffffffffff, 0x3, &(0x7f0000000180)=0x2d9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_IRQ_BUSID(r7, 0xc0106403, &(0x7f00000001c0)={0x10001, 0x9, 0x7, 0x200}) r8 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r11 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r12 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r14 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r13}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r15 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) sendmsg$nl_route(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)=ANY=[@ANYRES64=r10, @ANYRESDEC=r3, @ANYRESOCT=r11, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r7, @ANYRESOCT=r0, @ANYRES64=r14, @ANYRESDEC=r3, @ANYRES64, @ANYRESDEC=r4, @ANYRESHEX, @ANYPTR], @ANYRES16, @ANYRES16=r15, @ANYRESDEC=r9], 0x7}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) sendfile(r5, r1, &(0x7f0000000140), 0xa8) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 270.792845][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 270.884886][T12378] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. [ 270.964437][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 270.970484][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:00:17 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:00:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) connect$bt_sco(r0, &(0x7f00000001c0)={0x1f, {0x1, 0x2, 0x7f, 0x4, 0x5, 0x1}}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)=0x1) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000280)='/&[*/cpuset\x00', 0xc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x200, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x800, 0x8001}, 0xc) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 271.318959][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_trie\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:17 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff0200", 0x14) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 271.836018][T12424] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:18 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x40401, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) socket$key(0xf, 0x3, 0x2) 07:00:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 272.223371][T12431] validate_nla: 5 callbacks suppressed [ 272.223381][T12431] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 272.305258][T12441] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000140)=""/140, 0x39e) [ 272.462916][T12450] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:18 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 272.790855][T12468] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:18 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000001c0)=0x7) fsetxattr$security_ima(r3, &(0x7f0000001240)='security.ima\x00', &(0x7f0000001480)=ANY=[@ANYBLOB="c7cc22bbd3d92b0402e2f8f25ad821c339283578eaac5554fa8159e0d12da1c1cc7dd51a4f6056c957c5667cb3775c3258757f199bdd76144b7fa7642ec05b119441a3c3517b16e7138b6ad8a411ce"], 0x4, 0x2) r7 = accept4$rose(r4, 0x0, &(0x7f00000013c0), 0x80000) getsockopt$SO_COOKIE(r7, 0x1, 0x39, &(0x7f0000001400), &(0x7f0000001440)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_MODULATOR(r4, 0x40445637, &(0x7f0000000140)={0x4, "db5b053b905edbf3af88f20c18df9a8566276c0589390bb37ef6237a721e4de0", 0x10, 0xae, 0x81, 0x39f2151296f1e93b}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = dup(r8) r10 = syz_open_dev$vcsn(&(0x7f0000001300)='/dev/vcs#\x00', 0x86c, 0x0) getsockopt$inet6_udp_int(r10, 0x11, 0x66, &(0x7f0000001340), &(0x7f0000001380)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(r9, 0x8030560a, &(0x7f0000001200)={0x0, 0x2, &(0x7f0000000200)="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", {0x801, 0x5, 0x32314142, 0x0, 0x6cd, 0x2, 0x7, 0xffff7fff}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 273.108113][T12475] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2c6040, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 273.212329][T12483] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. [ 273.268839][T12486] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:19 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 273.587525][ C0] net_ratelimit: 7 callbacks suppressed [ 273.587537][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 273.598681][T12504] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 273.669286][T12509] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:19 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000002c0)={0x4, 0x70, 0x81, 0x1f, 0x1, 0x2, 0x0, 0xfffffffffffffffc, 0x100, 0x1a, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x800, 0xfff}, 0x4, 0x100000001, 0x1a72, 0x4, 0x8, 0x9, 0xfff}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x20000, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000095000000f486d8cbb9b119f96eacb389e516f6fcf6fbfb503339061b40dd30b3177816f55171cfb698aadacacd78bbb3e16809e9143b473133cf4dd226fff904f40a5671d591b09114e5a7df25a583c4a8c9ffd1c4ec6554557aef4b30f682f1f17591dcd3a3302e1ce6b1b6222ac9059ee3fd30dff990589b5a88cede98d43fa8528e1dc54891e5e1fd1a8fd3d64eba5718b258328940e54e5db8a44ba833930e0c04d71b950c3c611e1bcf576f6e042e897428e46054456df114b7d4"], &(0x7f0000000080)=0xb9) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x7, 0x4c0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getdents64(r6, &(0x7f00000001c0)=""/140, 0xfffffffffffffeba) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) 07:00:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 273.994797][T12516] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 274.013969][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x6, 0x0, 0x10000, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000180)={r3, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 274.099267][T12524] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. [ 274.163778][T12527] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 274.220805][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:20 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/4\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) [ 274.482595][T12548] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 274.555072][T12553] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:20 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000140)=""/47, 0x2f) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) sendto(r3, &(0x7f0000000180)="8ce0058844e3362024f13b69f0efe9fdf9ac012a06fb113ca05e8191fe39bd27ca9a11f284f842e1131c6d1bc0267921fe99ef9ce845ad1937d1207e178e16b6e4cb751d4427678cce09a9c1de1c27fee41ed23f08742c8aab9b9e124aaad2057bcdd52fda4ae8d934fb2203e0037a8ba65d2a239301a30a0cf58e8d46d2d10cec5db45fd13cef246ee8ef706296b6fca7b83eb4eec5cb0c2e1749bab8a966f702c7622ececc1600da81c8136bc607694f948b25c7ceec66e610b2ba9a93df08c1d70031523ccffcc27ad13e16837f068bdeea607860978b4c8ba1f6360210be1ac8f06657d7d6cb65", 0xe9, 0x40, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 274.891313][T12560] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 274.936841][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) bind$unix(r2, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) [ 275.039865][T12571] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. [ 275.085252][T12573] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 275.178773][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:21 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f00000001c0)) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 275.479939][T12595] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:21 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 275.836690][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) getdents(r0, &(0x7f0000000040)=""/47, 0x2f) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 275.937161][T12610] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. [ 276.083177][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:22 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f00000001c0)) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:22 executing program 2: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/47, 0x2f) socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000014000100000000000000000002000000", @ANYRES32, @ANYBLOB="08000200ac1414aa0800080085050000e5ba64d510a18a70b6c34e7ec8bd18580289b68f19d100a38283657f8fa46720ab364887bd9b1a5eb23c846b4bb6377cc28cf154c81d895c6bed09fc53946061590abf34ac2d"], 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000000)={0x4, 0x7}) getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/140, 0x8c) [ 276.372907][T12638] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:22 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x7ff575f9f1387832, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x4218, r2) write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0xfffffffffffffff5, 0x8, {{0xdc, 0x0, 0x2, r2}}}, 0x28) 07:00:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 276.730226][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x400000, 0x0, {0x2, 0x0, 0x0, 0x0, r1}}, 0x2ce}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000001c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000200)='net/stat\x00') getdents(r4, &(0x7f0000000040)=""/47, 0x2f) setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000240)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getdents64(r4, &(0x7f0000000080)=""/140, 0x8c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_GET_DEVICE_ATTR(r7, 0x4018aee2, &(0x7f0000000140)={0x0, 0x401, 0xf0, &(0x7f0000000000)=0x3a5c}) [ 276.837403][T12654] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 276.981238][T12663] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 277.060908][T12663] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 277.074286][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:22 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f00000001c0)) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 277.262368][T12681] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:23 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r0, &(0x7f0000000040)=""/47, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), 0x4) 07:00:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 277.633508][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 277.645944][T12686] validate_nla: 7 callbacks suppressed [ 277.645954][T12686] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:23 executing program 2: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = syz_open_procfs(r0, &(0x7f0000000280)='ses\x94io\x00\x00\x00\x00\xa5\xec\xad\xe0\xb8\xe5\x03\x1c\x82\b\x006\xb7?\x04\x95 \xa5\x97G\xfdf\xe5\xee;\xa4S\xaf\x1b\xbf\xf0\xc8\x04Qb\xbd0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents64(r1, &(0x7f0000001440)=""/140, 0x1f1) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f00000013c0), &(0x7f0000001400)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000100)) ptrace(0x10, r6) sendmsg$nl_netfilter(r5, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="db4342e26c47870ad1000000"], 0x1028}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008000) r7 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001340)='/dev/dlm-monitor\x00', 0x420200, 0x0) connect$rxrpc(r8, &(0x7f0000001380)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @rand_addr=0xc6}}, 0x24) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x4) 07:00:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 277.884056][T12706] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:23 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 278.111082][T12721] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 278.201296][T12726] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:24 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod(&(0x7f0000000200)='./file0\x00', 0x8000, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getdents(r5, &(0x7f0000000240)=""/47, 0xfffffe5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f0000000280)={0x0, @adiantum}) socketpair$unix(0x1, 0xf, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r13, 0x4018620d, &(0x7f00000001c0)={0x73622a85, 0x3001, 0x1}) ioperm(0x6, 0x6, 0x6) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) 07:00:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 278.596247][T12735] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 278.598271][ C1] net_ratelimit: 1 callbacks suppressed [ 278.598282][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:24 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff5a6) prctl$PR_SET_ENDIAN(0x1e, 0x0) [ 278.783879][T12750] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 278.847051][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:24 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 279.072805][T12763] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 279.181942][T12770] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:25 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\xd3\x81\xff\x9c\xf1\xcc\xfe:4\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x800) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x4, 0xbbc00000000, &(0x7f0000000040)=0x671f}) fchdir(0xffffffffffffffff) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getresgid(&(0x7f0000000000), 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000200), 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r6, 0x0) fcntl$dupfd(r5, 0x406, r6) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000406023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 279.986500][T12805] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 280.055507][T12810] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.3'. 07:00:26 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x800) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x4, 0xbbc00000000, &(0x7f0000000040)=0x671f}) fchdir(0xffffffffffffffff) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getresgid(&(0x7f0000000000), 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000200), 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r6, 0x0) fcntl$dupfd(r5, 0x406, r6) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000406023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 280.397206][T12817] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 280.431972][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 280.526144][T12828] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 280.688354][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:26 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 280.965751][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:27 executing program 1: write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:00:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x800) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x4, 0xbbc00000000, &(0x7f0000000040)=0x671f}) fchdir(0xffffffffffffffff) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getresgid(&(0x7f0000000000), 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000200), 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r6, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f00000004c0)=""/158) accept$packet(r0, &(0x7f0000000140), &(0x7f0000000280)=0x14) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000406023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 07:00:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 281.324395][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 281.364430][ C1] protocol 88fb is buggy, dev hsr_slave_0 07:00:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 281.370318][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:00:27 executing program 1: write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:00:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:27 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:27 executing program 1: write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:00:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:27 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000005c0)={0x5, 0x0, [{0x2, 0x0, 0x0, 0x0, @msi}, {0x0, 0x0, 0x0, 0x0, @sint}, {0x0, 0x0, 0x0, 0x0, @adapter={0x0, 0x0, 0x3e, 0x6, 0x6}}, {0xff, 0x0, 0x0, 0x0, @msi={0x0, 0x0, 0x80000000}}, {0x0, 0x0, 0x0, 0x0, @msi}]}) epoll_create1(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000001e4c00006ba158a30367c175ab"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:00:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:27 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:00:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:28 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:00:28 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:28 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000005c0)={0x5, 0x0, [{0x2, 0x0, 0x0, 0x0, @msi}, {0x0, 0x0, 0x0, 0x0, @sint}, {0x0, 0x0, 0x0, 0x0, @adapter={0x0, 0x0, 0x3e, 0x6, 0x6}}, {0xff, 0x0, 0x0, 0x0, @msi={0x0, 0x0, 0x80000000}}, {0x0, 0x0, 0x0, 0x0, @msi}]}) epoll_create1(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000001e4c00006ba158a30367c175ab"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:00:28 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 07:00:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 282.811580][T12943] validate_nla: 8 callbacks suppressed [ 282.811592][T12943] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:28 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 283.115797][T12962] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:29 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x0, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x800) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x4, 0xbbc00000000, &(0x7f0000000040)=0x671f}) fchdir(0xffffffffffffffff) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getresgid(&(0x7f0000000000), 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000200), 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r6, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f00000004c0)=""/158) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000406023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 07:00:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 283.704713][T12978] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 283.737688][ C1] net_ratelimit: 6 callbacks suppressed [ 283.737699][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 283.764459][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 283.764478][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 283.770317][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 283.776019][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:00:29 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 283.967026][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 284.035365][T13000] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 284.251966][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 284.252634][T13012] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:30 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x0, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x800) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x4, 0xbbc00000000, &(0x7f0000000040)=0x671f}) fchdir(0xffffffffffffffff) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getresgid(&(0x7f0000000000), 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000200), 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r6, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f00000004c0)=""/158) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000406023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 07:00:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 284.591214][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 284.602432][T13023] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:30 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 284.862722][T13041] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 284.871518][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x800) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000100)={0x0, 0x4, 0xbbc00000000, &(0x7f0000000040)=0x671f}) fchdir(0xffffffffffffffff) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getresgid(&(0x7f0000000000), 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) fanotify_mark(r4, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000200), 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') setns(r6, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f00000004c0)=""/158) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000406023e0001a041a0c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 285.062714][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:31 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x0, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x1277, 0x400007) [ 285.511190][T13072] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:31 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 285.758088][T13086] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 286.001248][T13103] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:32 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:32 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xb121, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) syz_open_dev$midi(0x0, 0x6, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r2 = socket(0x0, 0x1, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='yam0\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x20]}, &(0x7f0000000180)=0xa) msgrcv(0x0, &(0x7f0000000780)={0x0, ""/4096}, 0x1008, 0x0, 0x0) 07:00:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:32 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:32 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xb121, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) syz_open_dev$midi(0x0, 0x6, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r2 = socket(0x0, 0x1, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='yam0\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x20]}, &(0x7f0000000180)=0xa) msgrcv(0x0, &(0x7f0000000780)={0x0, ""/4096}, 0x1008, 0x0, 0x0) 07:00:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:33 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:33 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xb121, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) syz_open_dev$midi(0x0, 0x6, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r2 = socket(0x0, 0x1, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='yam0\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x20]}, &(0x7f0000000180)=0xa) msgrcv(0x0, &(0x7f0000000780)={0x0, ""/4096}, 0x1008, 0x0, 0x0) 07:00:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:33 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:33 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xb121, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) syz_open_dev$midi(0x0, 0x6, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r2 = socket(0x0, 0x1, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='yam0\x00'}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x20]}, &(0x7f0000000180)=0xa) msgrcv(0x0, &(0x7f0000000780)={0x0, ""/4096}, 0x1008, 0x0, 0x0) 07:00:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 287.843930][T13193] validate_nla: 4 callbacks suppressed [ 287.843941][T13193] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:33 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:33 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 288.170757][T13199] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:34 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:34 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 288.499273][T13220] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:34 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:34 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x2) 07:00:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 289.083845][T13249] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:35 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x8) 07:00:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xf, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:35 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:35 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 289.455376][T13267] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:35 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xc0, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0xa) 07:00:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:35 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:35 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 289.734016][T13285] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:36 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xec0, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0xf) 07:00:36 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:36 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 07:00:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x2f) 07:00:36 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 290.370078][T13303] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:36 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x33fe0, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:36 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 290.613629][T13321] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 290.620632][ C1] net_ratelimit: 13 callbacks suppressed [ 290.620644][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:37 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f320000", 0xb) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:37 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20bfdff4, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0xf4) [ 291.253047][T13337] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:37 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x20000050) 07:00:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x7ffff000, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 291.372893][T13351] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:37 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 291.493738][T13360] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:37 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x800000000002, @multicast2}, 0x10) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x61a, @mcast2, 0xfff}, 0x1c) 07:00:37 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f320000", 0xb) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xfffffdef, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:37 executing program 2: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f00000000c0)={0x0, 0xbe4b, 0x7f, [], &(0x7f0000000040)=0x7f}) 07:00:38 executing program 2: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000100)={{0x1, 0x0, @identifier="0cba5e92ac3eb1ef427372737e64708f"}}) dup2(r0, 0xffffffffffffffff) listen(r1, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000180)=r6) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x800, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x3, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 292.259835][T13389] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:38 executing program 2: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 292.443165][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:38 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:38 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f320000", 0xb) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x6, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:38 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x801, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x106}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r3, 0xb81, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffff9, 0x25a, 0x1ff}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 07:00:38 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 293.041393][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 293.064918][T13422] validate_nla: 3 callbacks suppressed [ 293.064930][T13422] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0xb, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 293.105268][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 293.143769][T13429] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:39 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000002, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:39 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:00:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8, 0x490c45) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGSW(r6, 0x8040451b, &(0x7f0000000380)=""/20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000028000000060000000d0000000000000e0400000000000000040000000000000a0000000006c8047697ef00a9679a409d2213c80030000000000000"], &(0x7f0000000440)=""/94, 0x46, 0x5e, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r9, 0x4008af22, &(0x7f0000000500)={0x0, r11}) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0x76, &(0x7f0000000080)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x0, 0x0, 0x0, 0xfffffffe}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={r7, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x3, 0x6, 0xd4000000, 0x7, 0x58}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000002c0)={r12, @in={{0x2, 0x4e20, @empty}}}, 0x84) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r13 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x260000, 0x0) fsconfig$FSCONFIG_SET_PATH(r13, 0x3, &(0x7f0000000100)='*#!^+system\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 293.408074][T13441] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 293.577173][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:39 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700", 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:39 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000008, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) listen(r4, 0x91) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 293.925387][T13461] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:39 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000300, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 294.026891][T13470] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0xffffffffffffff2a) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000540)={0x7c, r3, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}]}, 0x7c}}, 0x0) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x158, r3, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x372}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff7}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x40}, 0x4) [ 294.077483][T13471] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x8ffffff1f, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:40 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:00:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 294.436774][T13491] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:40 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700", 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:40 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x2, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:40 executing program 0: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x4e22, @remote}}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3f}}}, 0x0, 0x6, 0x0, "4905d22ac7eee01109ed42363d66658aca8f1b188908cf88822b2615a86d33a1a251c1af6c59d2eb96e11465964a63ba18268e48c4b9a0dfa0bf9f27ee8f3f2a6410b6c35daab1b6ec2439ac61608bc7"}, 0xd8) r3 = getpgrp(0xffffffffffffffff) setpgid(r3, 0x0) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 294.839761][T13501] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 294.872404][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:40 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 294.919910][T13510] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00000001c0)=0x413, 0x4) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x22041) getsockname$inet(r2, &(0x7f0000000100), &(0x7f0000000140)=0x122) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @rand_addr="104aac3c5fbe51c900000400", 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0xfffe, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB="2801000014000100000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000200ac1414aa0800080085050000"], 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000180)) 07:00:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x4, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 295.085754][T13519] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:41 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:00:41 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:41 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700", 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x5, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000180)='netdevsim0\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) setitimer(0x2, &(0x7f00000001c0)={{}, {0x0, 0x7530}}, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800008014000100000000000000000002000000", @ANYRES32=r6, @ANYBLOB="08000200ac1414aa0800080085050000"], 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r8 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r11 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r12 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r13 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r15 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r15, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r14}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ppoll(&(0x7f0000000240)=[{r10, 0x20}, {r11, 0x8088}, {r12, 0x8}, {0xffffffffffffffff, 0x500}, {r15, 0x400}], 0x5, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x6}, 0x8) accept4(r7, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000140)=0x80, 0x800) socket$packet(0x11, 0x2, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) 07:00:41 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:41 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x6, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 295.749986][T13542] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 295.809107][T13549] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 295.852822][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:41 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x8, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 295.934448][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 295.940378][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 296.010609][T13559] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:42 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x0, 0x0) 07:00:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 296.223579][T13569] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 296.244466][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 296.244519][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 296.250534][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 296.257245][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:00:42 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff02", 0x13) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:42 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x9, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 296.701008][T13583] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. [ 296.736123][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 296.974464][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 296.980450][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:00:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000100)={0x52, 0xbf, 0x3, {0x91, 0x5}, {0x200, 0x8}, @period={0x59, 0x82, 0x9, 0x1ff, 0x0, {0x2, 0x6, 0x1, 0x8}, 0x7, &(0x7f00000000c0)=[0x4, 0x9, 0x5, 0xe9d, 0x9, 0x2, 0x1000]}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r3, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:42 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xa, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:42 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x0, 0x0) 07:00:43 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xa, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xb, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getpeername$tipc(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:43 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff02", 0x13) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:43 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xf, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xe, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @mcast2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x25, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 297.680117][T13630] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:43 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x0, 0x0) 07:00:43 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x2f, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x10, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:44 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff02", 0x13) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x11, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x5a, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:44 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x8001, 0x101820) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0xde0, @mcast1, 0xb9}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x60, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r6, 0x89e2, &(0x7f0000000140)) sendmsg$nl_route(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f00000000c0)={'bond_slave_1\x00', 0x3}) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 298.620141][T13674] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:44 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x12, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xc0, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000200)={r7, 0x1f, 0x8000}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687463915e3a702a9d8aea872943afd874e2f98b579a7186270146d0e02c06cffa8c63cd7dc46760253ef0b2a20a602210318f8104a27ea57b012d31c34951dc119dac04eab9c68842086234a45fbe202000400000004", 0x66, 0x400}], 0x0, 0x0) [ 299.040491][T13693] EXT4-fs (loop3): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 299.217543][T13697] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 299.233991][T13693] EXT4-fs (loop3): VFS: Found ext4 filesystem with unknown checksum algorithm. 07:00:45 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff0200", 0x14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xec0, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x13, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:45 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x49249249249250f, 0xff03) 07:00:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x33fe0, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x14, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:45 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 299.509504][T13697] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 299.528013][T13725] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:45 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_elf64(r3, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xd56, 0x0, 0x100000000000000}], "", [[], [], [], [], [], [], [], []]}, 0x878) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xa0', 0x4004) 07:00:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20bfdffc, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3c, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) signalfd(r1, &(0x7f00000000c0), 0x8edd4412) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$packet(0x11, 0x1, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x7fff}, 0x28, 0x1) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @rand_addr=0x6}, 0x10) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000100)={0x1, 0x1, 0x2, 0x6b01, 0x2}) 07:00:46 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff0200", 0x14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:46 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x7ffff000, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x60, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) socket$rds(0x15, 0x5, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x20, 0x20000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='&dTW\xdd\x1fJ\xe9\xe2\xab@', 0x5596, 0x193800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0xec, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffff35}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x258}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xffff, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @mcast2, 0xffff}}}}]}]}, 0xec}}, 0x90) write$P9_RFSYNC(r2, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000400)="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", 0x1000, 0x44050, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x2, 0x1, 0x2, {0xa, 0x0, 0x4217, @dev={0xfe, 0x80, [], 0x20}, 0x6}}}, 0x80) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r1}, 0x8) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000100)=""/124) socket(0x0, 0x0, 0x0) 07:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000000c0)=0x6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0xfffffdef, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:46 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 300.451937][T13777] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0xfffe, 0x7ff, @rand_addr="00004d5d45ed75b72e0a000000006e80"}, 0x1c) listen(r1, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x29}}, 0xffffffffffffffdc) rt_sigreturn() 07:00:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x300, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x3, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:46 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff0200", 0x14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:46 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) 07:00:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x500, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x4, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:46 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000603000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) [ 301.220525][ C1] net_ratelimit: 8 callbacks suppressed [ 301.220537][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000100)={0x4, 0x7, 0x4f, 0x0, 0x80000000, 0x7, 0x20, 0x9, 0x81, 0x3, 0x1, 0x1, 0x0, 0x5, 0x8, 0x6, 0x8, 0x3f, 0x9}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e34, 0x0, @rand_addr="1e112ee800"}, 0x1c) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x5, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x600, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:47 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x8086, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="5e80c989201683f8365a22a141880542"}, {0xa, 0x0, 0x0, @empty}}}, 0x8061) [ 301.317961][T13818] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x900, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) 07:00:47 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x6, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:47 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) 07:00:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xa00, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) [ 302.157969][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x8, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xb00, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:48 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) 07:00:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000140)=""/192, 0xc0}, &(0x7f0000000200), 0x1}, 0x20) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f00000000c0)={{0x0, 0x0, @reserved="18f2264077cb5b570c1ce812d9fec47fee3726727477a4e02c44eee1ca8808e7"}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r3, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) [ 302.273830][T13860] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x9, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 302.461475][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 302.484507][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 302.490511][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 302.494483][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 302.502085][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 302.548943][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:48 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xe00, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) 07:00:48 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x10079c4}) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) 07:00:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0xa, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000180)={0x84fa, 0x3, 0x3, 0x9, 0x8, 0xf282, 0x20b}) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f00000001c0)={0x8000, 0x7f}) listen(r3, 0xffffffff) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf00, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) 07:00:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0xb, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:49 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFCONF(r1, 0x400448cb, 0x0) [ 303.192865][T13900] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2a2940, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1100, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 303.456819][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:49 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:00:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x10, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) 07:00:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1200, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0xc02) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x3, @broadcast, 'erspan0\x00'}}) listen(r1, 0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) ptrace(0x10, r4) getpgrp(r4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) socket$packet(0x11, 0x2, 0x300) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB="e2ffffff9ad1840156a5bdc7000000000000", @ANYRES32=r6, @ANYBLOB="00000100e00000020800080085050000"], 0x110}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000200)={r7, r0, 0x9, 0x9a, &(0x7f0000000140)="fc10932813390b786e92a029c172e1c506311555bfdea359d563637ebba733b1af29d64995af60e99214692e8b08ce184a5c6f9d6f7b35f3fc4e73eb09fcd4609009e4d07a002966bdfcc7c9ed60ac60d884e18773c80d6ff1866312470e4f7cd2ca2f74b7ec620f68809c6e26c5ed278afbb8b38a1f4134f5212296d62d82973103c40bb156198ec64cbdac492ce5218df6359028dc5867b0a8", 0x8, 0x88, 0x3, 0x0, 0x3, 0x1, 0x2, 'syz1\x00'}) [ 304.031390][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) 07:00:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x11, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 304.071647][T13933] FAT-fs (loop3): count of clusters too big (4294952127) [ 304.116864][T13941] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1300, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 304.160864][T13933] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket(0x10, 0x803, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x8000, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r3 = accept4$bt_l2cap(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x40000) listen(r3, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 304.271924][T13950] FAT-fs (loop3): count of clusters too big (4294952127) [ 304.307331][T13950] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x10, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x12, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:50 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1400, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4, 0x0, @loopback, 0x2}, 0x11) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x14, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000200)={r7, 0x1f, 0x8000}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3c00, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 304.963682][T13978] FAT-fs (loop3): count of clusters too big (4294952127) [ 305.002402][T13978] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x5a, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 305.039027][T13988] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f00000000c0)={{0x3f, 0x7}, {0x2, 0x9}, 0x2, 0x2, 0x4}) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 305.144009][T13989] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3f00, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x63, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 305.441893][T14004] FAT-fs (loop3): count of clusters too big (4294952127) [ 305.491215][T14004] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:51 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0x3, @default, r2}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x2, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000200)={r7, 0x1f, 0x8000}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x4000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 305.855850][T14029] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 305.882421][T14029] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 305.908826][T14024] FAT-fs (loop3): count of clusters too big (4294952127) [ 305.925246][T14036] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x3, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x6000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 305.960400][T14024] FAT-fs (loop3): Can't find a valid FAT filesystem [ 306.071279][T14038] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x4, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000100)={0xb}) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r3 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x2, 0xffffffff, @remote, 0x704}, 0x1c) listen(r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x800000000002, @loopback}, 0xfffffffffffffc82) [ 306.256830][ C0] net_ratelimit: 4 callbacks suppressed [ 306.256842][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 306.415946][T14056] FAT-fs (loop3): count of clusters too big (4294952127) [ 306.440392][T14056] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:52 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x5, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000200)={r7, 0x1f, 0x8000}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200800, 0xa8) bind$rose(r1, &(0x7f00000000c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x6, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x34000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 306.746539][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 306.755074][T14076] FAT-fs (loop3): count of clusters too big (4294952127) [ 306.776835][T14076] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x6, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 306.835198][T14087] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 306.978133][T14090] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 307.074289][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x400300, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x7, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 307.125791][T14105] FAT-fs (loop3): count of clusters too big (4294952127) [ 307.189136][T14105] FAT-fs (loop3): Can't find a valid FAT filesystem [ 307.279436][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:53 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) 07:00:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x8, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf0ffff, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000200)={r7, 0x1f, 0x8000}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) 07:00:53 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 307.641815][T14131] validate_nla: 1 callbacks suppressed [ 307.641826][T14131] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 07:00:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000100)=0x10) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000200)=0x4) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x10) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 307.696963][T14129] FAT-fs (loop3): count of clusters too big (4294952127) 07:00:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0xa, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 307.773171][T14129] FAT-fs (loop3): Can't find a valid FAT filesystem [ 307.804828][T14139] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 307.832572][T14145] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:53 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x2000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000200)={r7, 0x1f, 0x8000}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) [ 307.992482][T14155] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 308.128763][T14157] FAT-fs (loop3): count of clusters too big (4294952127) [ 308.149029][T14157] FAT-fs (loop3): Can't find a valid FAT filesystem [ 308.334898][T14166] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:54 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x5928ed31953b8640, &(0x7f0000000080)=0x6a, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000200)) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f00000000c0)=""/161) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x10, 0x2, 0x0) sendto(r8, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r7, 0xab00, r8) 07:00:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0xb, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r2 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0x76, &(0x7f0000000080)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000100)={r5, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000200)={r6, 0x1f, 0x8000}, 0x8) 07:00:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0xc, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x4000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 308.694860][T14190] FAT-fs (loop3): count of clusters too big (4294952127) [ 308.725171][T14190] FAT-fs (loop3): Can't find a valid FAT filesystem [ 308.755039][T14199] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. [ 308.770243][T14196] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000000)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:54 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0xd, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x5000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 309.086975][T14211] FAT-fs (loop3): count of clusters too big (4294952127) [ 309.132254][T14211] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:55 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:55 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "0f5512490da1df32", "c5ccd7c15498ba2603932b111d04c797c5324c17acc8a52d00d6f1f2744dfc72", "a23c80ea", "44f0be68d5969096"}, 0x38) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) connect$inet(r1, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x76, &(0x7f0000000080)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:00:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x6000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0xe, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x8000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x10, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 309.569851][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 309.595651][T14241] FAT-fs (loop3): count of clusters too big (4294952127) [ 309.603426][T14241] FAT-fs (loop3): Can't find a valid FAT filesystem [ 309.650861][T14251] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.1'. 07:00:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x4, 0x81}) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f00000001c0)={0x5, 0x2, 'client0\x00', 0xd0a428097a7ef595, "ba21eadc5fc2eaf2", "850baa4b969f1e3a5b02ea0e87f45a36d33977c10ffe9d6b2e5a1d5a926a7998", 0x1, 0xff}) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 309.749452][T14250] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x9000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x11, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 309.927382][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 309.992754][T14266] FAT-fs (loop3): count of clusters too big (4294952127) [ 310.021681][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 310.041595][T14266] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:56 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:00:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x12, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f646576b06a196b307030"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='reiserfs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfffffffffffffffe, 0x0) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x7, 0xc4, 0x1f, "75b316cbf65fae69cbc471e7d77e74950fe57c5467b3b598b2f004bba0f261bfd88add111e19417fa41c710dda516910fb63cd44f7651c72dfeeaa887a3026", 0x13}, 0x60) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @rand_addr=0x1}, 0x10) 07:00:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xa000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x5a, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x1d, &(0x7f0000000080), 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2, 0xfffffffe}, 0x1c) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) poll(&(0x7f00000000c0)=[{r0, 0x2204}, {r1, 0x1000}, {r4, 0x1}, {r1, 0x1}, {r1, 0x6050c031c22503db}, {r0, 0x1101}, {r1, 0x8}], 0x7, 0x9) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xb000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 310.497260][T14296] FAT-fs (loop3): count of clusters too big (4294952127) [ 310.528743][T14296] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 310.687447][T14305] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xe000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000002, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 310.954787][T14329] FAT-fs (loop3): count of clusters too big (4294952127) [ 310.985831][T14329] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:57 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x9, @remote}, 0x0) 07:00:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:00:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000008, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 311.425709][T14344] FAT-fs (loop3): count of clusters too big (4294952127) [ 311.462657][T14344] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x80000000a, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x10000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x18) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000006600070500"/20, @ANYRES32=r6, @ANYBLOB="0000ffff0200ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x2c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_BROADCAST={0xc, 0x2, @random="718cbaea1004"}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000006600070500"/20, @ANYRES32=r11, @ANYBLOB="0000ffff0200ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) sendmmsg$inet6(r1, &(0x7f0000001140)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="7e69fbc5faf2458f230c3438721795d62a7899acd4fe7a23d49e77ca1a7b63416eef92f35693f66d138c141df7101e7090dc5f7eb3cfc404d9d1a3a1373d4c14875b08ab8e56771d6b47e4ddb12e6f09f6274ffe613a346b4dcf79d2cd1c4b249ddc673dd48d006aad8c3fd129cde8de678b9c1287534798732f5137b6d97756b5e0fd9dec789c419f7727e219f38480cd9759314c18697cc1053fb1eaf93e2487986c4ca7d504aa", 0xa8}, {&(0x7f0000000180)="dd404bdf4f3e30d86812b2fd1be74f9369b49a24912629b67400ba198bc3fb376dc7700b05fc6cbc4a92b29eb3c87f83a09397f15c46bbeb5573851701ca65b91b2c83b81fea25450b1ee0bc04a0f3d209a059b7d4128d249c9b0e3b69f541742faae70b5d1ee79eb05a4fe8bee08b0532638bd869729c36338c9b10e8bd892bb6b89f0e1f69958035de25874823d3b6c5e63f9441e234ed94d41d5c", 0x9c}, {&(0x7f0000000240)="70b77ecd80132515a9544571424f7fcbdec70d9e923eac2209da6b9a456fec179868f9d14b736f04211a17bed533bcdb60b8d3d9b04055d475ae5ccd3ec50b3a7c950a20f9531434cfcfb2fd7bc2596c7a4a8c86399ceb39f4f64fd72b9d0953d4924694c5aa50dcd43146461fd5693f6cb7fc5942823262b5aaff63d92276f3c4aaaf4eebdd39e5b5d8ad0ce1c527c4ff8eff55bbe24ade5b128ce7a189ac15d1b84a531c9515581a115c707a2dea053f826a0f", 0xb4}, {&(0x7f0000000300)="28a8fa32db66dcd2450e9ec81404f6c5aa5cdf5ab22a9f8fbd355cf94648d11148757f97273698b5ceeaf1cf4afcf6f446be9910eb409cb2164f0d56d9e9d3747e9bf2565e83dea97b0d207e71414727481a7514ea27e82a5ce217c75c75ff7d21daa3478a00655bb40350dea374bdb646cfded8e5bd190d64e2b3e45d13b96301f877ad0d2ce8bfd1f958c9f149401db552287d20d21897afdcb3d3563581af1ddf5e26291be7093d4a2c79fb9030c43b3855308443796d8326a1af91b96286b719a8be46b0cd61a8119684e537", 0xce}, {&(0x7f0000000400)="743cfe46fb4d51c72b7b8426a4a1be3782a250494e813c4ea7188183d68879a40fa82af663638fecc6bbb18977a32d81a4c2e6601a1a9886e280ce495fc49da690bbad2ff74e2b65afc238eca62a1f7c1e5c9a733eed9ac62bfccd044c443ece92083236dbfe18386f7d88c1a742b1e09c321f28ec0b026c327b910ff9d4f8ba89bad2136323d27c85ae7a354554d54be4b68450541c299e8c8dfed3b993e61bd135f22f49e1f161e667dbb70de659ed795c7ae9cd7aa3381a9a52f27c7d4fe437d69d345550bb7596df975d322b75", 0xcf}], 0x5, &(0x7f0000000580)=[@tclass={{0x14, 0x29, 0x43, 0x5}}, @dstopts_2292={{0xa0, 0x29, 0x4, {0x3c, 0x10, [], [@enc_lim={0x4, 0x1, 0x8}, @pad1, @generic={0xdd, 0x3c, "53ce15a3ef76f42f9005ec2072fa052967a8d2306793796da9c260e46f34268d7e827dd0093d0c0787ce5d359b7d7ab9d58d06349fcc0ba8eeb69934"}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0xbe}, @jumbo={0xc2, 0x4, 0x8}, @generic={0x9, 0x35, "835a043ddfd910cc91275250901e87526d42ef105e1024cae00fd554cc687c3866b29a542a5288e697239ae01fefd4c08713eaf0b9"}]}}}], 0xb8}}, {{&(0x7f0000000640)={0xa, 0x4e21, 0x1, @mcast1, 0x1}, 0x1c, &(0x7f0000000880), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="000000001400000000000000290000003e00000000000000000000001400000000000000290000000b00000000000008000000002400000000000000290000003200"/84, @ANYRES32=r11, @ANYBLOB="000000008000000000000000290000a146e421875fca7cb36a72b6acbea03c0037000000880c000000000000c20400000000040105c910ff010000000000000000000000000001c9108a65013f503f82307558bb2763fe13c60130a23c3944edb0015343eb5f6fde3d81902a3ee2b0ab3db84fcf76a509ebd2f8da8b1f7cd9658c63a2d2"], 0x2c8}}, {{&(0x7f0000000bc0)={0xa, 0x4e22, 0x1, @rand_addr="12ca870aba3462fa222a8d4196484148", 0x6}, 0x1c, &(0x7f0000000f40)=[{&(0x7f0000000c00)="380162effcd321db6b96c45e322e2d77da46f4fa9a32ff98663c24e5a063a010ba6ee500234255914731180f14ec19e8259d0e4c47de0e0db2fa90b82d5679df2a04f834f8fa3ed89ccc0f27d68b66094ac82d093ace7d774de93c613bbd8b81b23788b317ceb254fb8bdd3705793ea52ffbf1f6d454ceeada7bd41014c786d1a3c6587e58806c8299e536e8f5b605bbbe61740e0d2c5aa69a5f4338f1bcf7d28d3bf51401c18d62545c5dc4df9dcf1762caf378d63f25a0a8b2c487932095fc42d432221ea943a6ed0dbabf8ce1dbab22fb891b14f39177cb506ba22c8d09197ae49a0ac09c", 0xe6}, {&(0x7f0000000d00)="8b5815d84b8c1fea4eb943f17c10fb4be40386f2edd309b6c0e303eda838fa8ee5e05d5127e3964e243ae377458adbcc58ea7ee1f8be7a4bc36f54cd0654427675eb97b51ffeff8bb279b751a9dab1990e8f46f079a44545", 0x58}, {&(0x7f0000000d80)="9b8049fe4b0fd1cd330313a988c98251fca668515a421d42bfd12393c14efa6a1278c42739bb3d7a42a9888ab0", 0x2d}, {&(0x7f0000000dc0)="21e2419e7cffe4d3a331f2b7967b30fbabf8dd4a6aac4e8d6d5a676ea28c61e6ad6ea4d077188942a462e15cdf7b8cdeef736d886a1464ba64ff65f3bb97eb5a145fe68d316e24cd7ce77c24cf16ab2f18d8c1334362fb2c7fdf9fd386631fca4b253d4ac76382e4197f10d3994c7d2848af89b34177f9f6082dcc5959fd1510627cc46ab56c5241c60f5a9bfe1af1f57c366ac1fc9e27efe562", 0x9a}, {&(0x7f0000000e80)="47ea22e69e5476b3deb556025b13b68f28b0595f50aa173e6f2bccc373d30243c195599fb05d301d93a32b4170a5768306d5424d38bca539a4c9c3a8eb9bcfd38622c66fe448b165776f0374b8e94baaeab97f251e81d4e81ea04f70ed49fddab549949c11112a645ea0dddde3b943f99639bfdc767389d0950ff8bfbc1a1754a4c778daba069044fb647b", 0x8b}], 0x5, &(0x7f0000000fc0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x20}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x87, 0x10, 0x2, 0xb3, 0x0, [@mcast2, @dev={0xfe, 0x80, [], 0x1f}, @dev={0xfe, 0x80, [], 0x12}, @rand_addr="84e7c39caf18730ff406b0439adee278", @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, @ipv4={[], [], @loopback}]}}}, @rthdr={{0x38, 0x29, 0x39, {0x87, 0x4, 0x1, 0x7b, 0x0, [@loopback, @dev={0xfe, 0x80, [], 0x20}]}}}, @hopopts={{0x28, 0x29, 0x36, {0x2b, 0x1, [], [@pad1, @jumbo={0xc2, 0x4, 0x3}, @pad1]}}}, @rthdr={{0x48, 0x29, 0x39, {0xa6, 0x6, 0x0, 0x4, 0x0, [@local, @empty, @rand_addr="77ce9090c53c49c6bf5e3307893c2abc"]}}}], 0x158}}], 0x3, 0x801) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r13 = dup(r12) socket$can_raw(0x1d, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) write$smack_current(r13, &(0x7f0000001200)='mime_type\x00', 0xa) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 311.640819][T14358] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x11000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000025, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 311.891580][T14376] FAT-fs (loop3): count of clusters too big (4294952127) [ 311.960479][T14376] FAT-fs (loop3): Can't find a valid FAT filesystem [ 312.017083][T14385] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:00:58 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:00:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x12000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x80000005a, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 312.264996][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 312.290658][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:00:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000300, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) accept4(r2, &(0x7f00000010c0)=@ax25={{}, [@remote, @rose, @bcast, @remote, @remote, @remote, @bcast, @bcast]}, &(0x7f0000001180)=0x80, 0x80c00) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000100)=0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x2, 0x0, @empty}, 0xfffffffffffffe65) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x13000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 312.354922][T14399] FAT-fs (loop3): count of clusters too big (4294952127) [ 312.375600][T14399] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 312.548509][T14409] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:00:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x87ffffff2, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x14000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 312.787350][T14426] FAT-fs (loop3): count of clusters too big (4294952127) [ 312.836866][T14426] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:59 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x0, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:00:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3c000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x87ffffff8, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000140001000000000000000000020000007f3a21666e00a51cc0eade8307d5c223d2113653f5a4f5d42b2fe7f836532949e299616a73705ffe87680eec08216fea837655c4b32bf5a899ea24d3775d056589e6", @ANYRES32=r3, @ANYBLOB="08000200000800"/16], 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f00000000c0)) listen(r1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3f000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x87ffffff9, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 313.263737][T14455] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 313.328876][T14452] FAT-fs (loop3): count of clusters too big (4294952127) [ 313.378790][T14452] FAT-fs (loop3): Can't find a valid FAT filesystem [ 313.415440][T14464] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:00:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x40000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:00:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x87ffffffe, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 313.462676][T14472] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 313.535028][T14462] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 313.547284][T14455] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 313.604470][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 313.610477][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:00:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x60000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 313.651969][T14476] FAT-fs (loop3): count of clusters too big (4294952127) [ 313.690423][T14476] FAT-fs (loop3): Can't find a valid FAT filesystem 07:00:59 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x0, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:00:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:00:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x8ffffff1f, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:00:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:00:59 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r2, 0x1) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000200)=0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:00:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x9effffff, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 314.173058][T14505] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 314.212480][T14506] FAT-fs (loop3): count of clusters too big (4294952127) 07:01:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf0ffffff, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r3 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x20, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) r5 = fcntl$dupfd(r1, 0x0, r2) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f00000000c0)=""/47) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 314.272693][T14506] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x2, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 314.325643][T14514] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:01:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xfffff000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 314.485332][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 314.504906][T14530] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 314.865399][T14547] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 07:01:00 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x0, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x3, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000001180)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x9e}, @in6={0xa, 0x4e20, 0x5403cf00, @remote, 0x6b293c02}, @in6={0xa, 0x4e23, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xd2ab}, @in6={0xa, 0x4e24, 0xf46e, @ipv4={[], [], @loopback}, 0x8}], 0x70) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0xffffffffffffff50, &(0x7f0000000080)={&(0x7f0000001200)=ANY=[@ANYBLOB="340000006600070500"/20, @ANYRES16=0x0, @ANYBLOB="0000ffff0200ffff000000000c000100677265640000000004000200"], 0x3}}, 0x0) sendto(r4, &(0x7f00000000c0)="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", 0x1033, 0x24002180, &(0x7f00000010c0)=@hci={0x1f, r9, 0x3}, 0x80) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000001240)='/dev/video35\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000001140), 0xfffffffffffffffe) 07:01:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xffffff7f, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 315.113036][T14563] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xffffff9e, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 315.188249][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 315.295662][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 315.324253][T14573] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 315.402017][T14585] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) r2 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x88040000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1b8, r3, 0x340b85cc7b99e65c, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffc00}]}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x50}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_LINK_PROP={0x4}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 07:01:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x5, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xfffffff0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 315.672968][T14598] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 315.688307][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 315.723726][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:01 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x40030000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x6, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @rand_addr="00000000fffffffffffffffc00"}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 316.013741][T14611] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6(0xa, 0x5, 0x1f) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xf4, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) epoll_create(0x6) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r5, 0xc0305616, &(0x7f00000001c0)={0x0, {0x101, 0x3}}) 07:01:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf0ffffffffffff, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x7, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x100000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 316.296675][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 316.333690][T14637] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:02 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0xffffffdd) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x8, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x200000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 316.888007][T14664] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x300000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x9, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 317.096355][T14679] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 317.183827][T14683] FAT-fs (loop3): bogus number of reserved sectors [ 317.252018][T14683] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:03 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xa, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x400000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) getsockopt$inet_int(r0, 0x0, 0xa67b90e4faf36c0e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x500000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xb, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 317.835596][ C1] net_ratelimit: 1 callbacks suppressed [ 317.835607][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 317.870646][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 317.912679][T14709] FAT-fs (loop3): bogus number of reserved sectors [ 317.941756][T14709] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) prctl$PR_SET_MM(0x23, 0x8c96ab792b127fa8, &(0x7f0000ffb000/0x2000)=nil) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r7, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x88000, 0x0) bind$bt_l2cap(r8, &(0x7f0000000140)={0x1f, 0x4, {0xff, 0x9, 0x1f, 0x1f, 0xc4, 0x1}, 0x7, 0x40}, 0xe) sendmsg$nl_route(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000280)='eth0vmnet1%vboxnet1:&\x00', 0x0, r6) 07:01:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x600000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 318.259311][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 318.304073][T14734] FAT-fs (loop3): bogus number of reserved sectors [ 318.327728][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 318.328490][T14734] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:04 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xe, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x800000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x2, 0x1, 0x8000, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) [ 318.737080][T14755] validate_nla: 2 callbacks suppressed [ 318.737090][T14755] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 318.740058][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 318.794560][T14750] FAT-fs (loop3): bogus number of reserved sectors [ 318.806230][T14750] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x900000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = msgget$private(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xffb8) setresuid(0x0, r4, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x630, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x8) fstat(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r6) r7 = getpgrp(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000100)={{0x0, r4, 0xee01, 0x0, r6, 0x1a, 0x2}, 0x2, 0xfff, 0x96e4, 0x0, 0x7, 0x2, r7, r8}) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$sock_SIOCGPGRP(r11, 0x8904, &(0x7f0000000180)) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r13, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r13, 0x6, 0x1d, &(0x7f0000000080), 0x4) connect$inet6(r13, &(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff, @mcast2, 0x3}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2, 0x0, @mcast2}, 0x1c) listen(r12, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:04 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) [ 319.049782][T14772] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:04 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x10, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xa00000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 319.235058][T14778] FAT-fs (loop3): bogus number of reserved sectors [ 319.288051][T14778] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 319.371734][T14786] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:05 executing program 0: chdir(&(0x7f0000000300)='./file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @rand_addr="5900000000000000e700"}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', r3}) getsockopt$packet_int(r2, 0x107, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x76, &(0x7f0000000080)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x5b}, &(0x7f00000002c0)=0x8) 07:01:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) 07:01:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xb00000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x11, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @empty}, 0x10) 07:01:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xe00000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 319.679485][T14808] FAT-fs (loop3): bogus number of reserved sectors [ 319.693947][T14813] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 319.704633][T14808] FAT-fs (loop3): Can't find a valid FAT filesystem [ 319.840379][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:05 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x12, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000340), 0x0, 0x0) 07:01:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0xffff, 0x0, @empty, 0x84}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$sndseq(r3, &(0x7f00000001c0)=[{0x6, 0x0, 0x81, 0x58, @time, {0x9, 0x9}, {0x0, 0x20}, @note={0x0, 0x9, 0x1, 0x81, 0xff}}, {0x49, 0x8, 0x4, 0x5, @tick=0x200, {0xff, 0xf7}, {0x3f, 0x8}, @ext={0x4b, &(0x7f0000000100)="cb75a041d33158a636c75aaafcb7b0dd3bac396de697511d2e2562ab16bf7ed3c4147423603a4fc1b965a9961154f45640e5faf0a84f2c1d1e88bb83c241460bbacb3ab4cf65edcf63ee96"}}, {0x14, 0x6, 0x80, 0x84, @tick=0x10000, {0xfc, 0xff}, {0x6, 0x61}, @raw32={[0x10001, 0x80000000, 0x100]}}, {0x9, 0x0, 0x7, 0x0, @tick=0x37, {0x1, 0x1}, {0x6, 0x5}, @ext={0x1e, &(0x7f0000000180)="777f66968025ac574b6985c44ccaec347dbc0385da14426d447b99ed1cf5"}}, {0xac, 0x10, 0x80, 0x7b, @tick=0x8001, {0x6, 0x20}, {0x48, 0x2}, @raw8={"ba37f3e15f599970f1679ff6"}}, {0x0, 0x3f, 0x9, 0x80, @tick=0x3, {0x7, 0x1}, {0x1, 0x6}, @control={0x0, 0x5, 0xffffffff}}], 0x120) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) accept4(r4, 0x0, &(0x7f0000000000), 0x80000) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) 07:01:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf00000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:05 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 320.179687][T14834] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1000000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 320.254658][T14839] FAT-fs (loop3): bogus number of reserved sectors [ 320.272997][T14839] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x13, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:06 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:01:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000340), 0x0, 0x0) 07:01:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x2, @ipv4={[], [], @broadcast}, 0x1000}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 320.477925][T14856] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:06 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1100000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x14, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:06 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 320.636374][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 320.654441][T14865] FAT-fs (loop3): bogus number of reserved sectors [ 320.661043][T14865] FAT-fs (loop3): Can't find a valid FAT filesystem [ 320.715255][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1200000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 320.821030][T14879] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000340), 0x0, 0x0) 07:01:06 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:01:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000000c0)=0x2, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) r3 = socket(0x10, 0x803, 0x0) socket(0x3, 0xa, 0x2) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 07:01:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x48, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1300000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:06 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 321.068932][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 321.084086][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 321.102602][T14892] FAT-fs (loop3): bogus number of reserved sectors [ 321.179300][T14892] FAT-fs (loop3): Can't find a valid FAT filesystem [ 321.197758][T14899] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{0x0}], 0x0, 0x0) 07:01:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4b, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x1400000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 321.489748][T14916] FAT-fs (loop3): bogus number of reserved sectors [ 321.496637][T14921] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 321.507690][T14916] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{0x0}], 0x0, 0x0) 07:01:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3c00000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:07 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:07 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:01:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4c, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f00000000c0)=0xfb, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40000, 0x0) bind$can_raw(r2, &(0x7f0000000200), 0x10) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) accept$inet(r6, &(0x7f0000000240), &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x76, &(0x7f0000000080)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r7, 0x80}, 0x8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r8, 0x7) listen(r1, 0x0) io_uring_setup(0xd9c, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x0, 0xffffffff}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x3f00000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:07 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 321.796473][T14935] FAT-fs (loop3): bogus number of reserved sectors [ 321.823450][T14935] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{0x0}], 0x0, 0x0) 07:01:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x60, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x4000000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:08 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 322.212873][T14972] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x6000000000000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x400, @dev={0xfe, 0x80, [], 0x1c}, 0xd52}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 322.266583][T14969] FAT-fs (loop3): bogus number of reserved sectors [ 322.291222][T14969] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x68, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:08 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:01:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)}], 0x0, 0x0) 07:01:08 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x9effffff00000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f00000001c0)={0xc, @output={0x0, 0x1, {0x7fffffff, 0x6}, 0x9}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r3, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x585a40, 0x0) ioctl$RTC_UIE_OFF(r5, 0x7004) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x18) 07:01:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x6c, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x74, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 322.952834][T15009] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 322.953116][T15005] FAT-fs (loop3): bogus number of reserved sectors [ 322.975341][ C0] net_ratelimit: 4 callbacks suppressed [ 322.975351][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xf0ffffff00000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 323.027076][T15005] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x1004}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f00000000c0)={0x0, 0xa5c, 0x8897, 0xfffffff9, 0x4, "d94ed85fb1a3e188e4a4baf0d8edc0954555e9", 0x7ff, 0x10001}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x7a, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:08 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)}], 0x0, 0x0) [ 323.414275][T15036] FAT-fs (loop3): bogus number of reserved sectors [ 323.450794][T15036] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:09 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:01:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xffffff7f00000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x15) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:09 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)}], 0x0, 0x0) [ 323.878993][T15050] validate_nla: 4 callbacks suppressed [ 323.879005][T15050] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 323.895339][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xffffffff00000000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:09 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 323.939008][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 323.954561][T15053] FAT-fs (loop3): bogus number of reserved sectors 07:01:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x300, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 323.980885][T15053] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000180)={0x3, @default, r3}) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000200)={0x0, 0x80000, r6}) 07:01:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) [ 324.112943][T15068] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0xfffffffffffff000, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 324.242502][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 324.398084][T15078] FAT-fs (loop3): bogus number of reserved sectors [ 324.420849][T15078] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:10 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:01:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x500, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:10 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r3 = socket(0x10, 0x803, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x2, &(0x7f00000002c0)="d177e3f858b5df5ad16ffe9158233fb06b915a542a4d8087fd26f1f539528ee92cce28c286762c272e0eb3621ee71a3068777f2145c0", 0x36) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x94, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8}, {0x8, 0x1, r1}, {0x8}, {0x8}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x14010040}, 0x40) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x1d, &(0x7f0000000080), 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x1, &(0x7f00000000c0)=0x1f, 0x4) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x2, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) [ 324.834765][T15097] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 324.845919][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x3, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:10 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 324.907053][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 324.919468][T15096] FAT-fs (loop3): bogus number of reserved sectors 07:01:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x600, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 324.982509][T15096] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x7, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f0000000080)=0x1, 0xfffffffffffffe82) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x4, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 325.182560][T15114] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) [ 325.248076][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 325.283006][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 325.452142][T15127] FAT-fs (loop3): bogus number of reserved sectors [ 325.466891][T15127] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:11 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 07:01:11 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x700, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x2, @empty}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) recvfrom$unix(r3, &(0x7f0000000200)=""/180, 0xb4, 0x40010000, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$CAPI_GET_PROFILE(r4, 0xc0404309, &(0x7f00000000c0)=0x401) timer_gettime(0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = semget(0x3, 0x3, 0x163) semctl$IPC_INFO(r6, 0x4, 0x3, &(0x7f0000000480)=""/124) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UDMABUF_CREATE(r7, 0x40187542, &(0x7f0000000140)={r9, 0x0, 0xfffffffffffef000, 0x10000}) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) ioctl$VIDIOC_QUERY_DV_TIMINGS(r9, 0x80845663, &(0x7f00000003c0)) r10 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_SET_ONE_REG(r10, 0x4010aeac, &(0x7f0000000380)={0xde14, 0x7}) 07:01:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x5, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) [ 325.763599][T15135] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x6, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 325.836769][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 325.870290][T15141] FAT-fs (loop3): invalid media value (0x00) [ 325.922266][T15141] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:11 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x900, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x8, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) [ 326.118763][T15156] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x402040) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e24, @loopback}], 0xfffffffffffffdd1) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0178c8f3", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0x76, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x7, 0xffff, 0x1, 0x58, 0x9e7, 0x81, 0xc438, 0x200, r6}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r8, &(0x7f0000000200)=0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r7, 0x4}, 0x8) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 326.316038][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 326.378167][T15169] FAT-fs (loop3): invalid media value (0x00) [ 326.384217][T15169] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xa00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x9, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:12 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:12 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 07:01:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) 07:01:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xa, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 326.704855][T15189] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:12 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000), 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x414400, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0xb0b, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @rand_addr=0x1f}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x20000010) [ 326.752892][T15187] FAT-fs (loop3): invalid media value (0x00) [ 326.771719][T15187] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xb00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xb, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000000", 0x14}], 0x0, 0x0) 07:01:12 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000), 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @loopback}, 0x184) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xe00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xe, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 327.077130][T15213] FAT-fs (loop3): invalid media value (0x00) [ 327.083974][T15213] FAT-fs (loop3): Can't find a valid FAT filesystem [ 327.299244][T15230] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:13 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 07:01:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000000", 0x14}], 0x0, 0x0) 07:01:13 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000), 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xf, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x80000, 0x0) sendto$inet(r1, &(0x7f0000000180)="56f6a5e399a8f17b25c0d0be8fa7ab4d306f57dbba93a01b1cee3473639ac9864dcd868514aaabbc7e6ef58c28d5c406b473fedae76b1b3f", 0x38, 0x4000000, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2}, 0x1c) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) prctl$PR_GET_SECCOMP(0x15) write$P9_RLCREATE(r3, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x11, 0x3, 0x8}, 0xd3}}, 0x18) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000240)={0x4, 0x7f, 0x7}) listen(r2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 327.565064][T15245] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x10, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:13 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x1100, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 327.614478][T15244] FAT-fs (loop3): invalid media value (0x00) [ 327.635369][T15244] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @remote}, &(0x7f0000000340)=0xc) bind$packet(r2, &(0x7f0000000380)={0x11, 0x7, r3, 0x1, 0x81, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000000", 0x14}], 0x0, 0x0) [ 327.818325][T15263] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x1200, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 328.028807][T15272] FAT-fs (loop3): invalid media value (0x00) [ 328.043292][T15272] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:14 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 07:01:14 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x11, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @local}, 0x1c) listen(r1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)="ba207b57b0d8482b18d0f68104a720678a854c753c8ad5e1b0ee2466bbc2775ed008481accc443181c9fe26f930f299bf1475fd3ddc1dcd25b58e005c9d441f6e4ba098e36e57c29e59f175576171422b559db26bd086b243c3e4c2921581330826f111862e0e58454cbfe6854a13b621a67ab758e002f39bf1aad339dc2697d756cc8a99131c848cdf8231b05ae44ca7dc2022b3d81299560f85df39b3701340affed21d4e498a6175a33d97d0dfbf25f81befd12ddaae6d0196848f103f67bb558b184a406645ef1219f1598fdee405b98f4d917e7a4352c807e0a673bdaff16a44b4298fc7e5fed86b7833f423124c7", 0xf1) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x1300, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000", 0x15}], 0x0, 0x0) 07:01:14 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x1400, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x12, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f00000000c0)={{0x3, 0x0, @identifier="b7ecb7aebcec0bb3c4eecfeb1590a52a"}, 0xc3, [], "573df9b45a61164b281d5aa5e10a678a97929ca4666cbef890c5992005e3e68fabccfaeb2e8c00d5b35d6e8f077632eb51164b9b1167025b50d9418776b4e2ed9d87989a5738f7d96b8f39d1dc6936c5e2c42089d47cfc9b56060cf53d2317a3b033367354ba15c23305f9a38bdefb0f4baebd62f61f2d8dd0dde2a2ef1942a40c02eb98332877aa17e6f51f41da35037b88ecc58a2b6eda52970c79bd9bf338a1a3f607c31737f6ada09dfe75ad4e331993f34b2d2a068772e0ec85e46f70b3578fe5"}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 328.552509][T15290] FAT-fs (loop3): invalid media value (0x00) [ 328.587524][T15290] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000", 0x15}], 0x0, 0x0) 07:01:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x2000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 328.790167][ C0] net_ratelimit: 5 callbacks suppressed [ 328.790177][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 328.808704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 328.814643][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 328.869136][T15314] FAT-fs (loop3): invalid media value (0x00) [ 328.880231][T15314] FAT-fs (loop3): Can't find a valid FAT filesystem [ 328.996828][T15323] validate_nla: 3 callbacks suppressed [ 328.996840][T15323] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x13, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:15 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000000c0)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000", 0x15}], 0x0, 0x0) 07:01:15 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @random="5c2ee2261fbc", [], {@ipv6={0x86dd, {0x0, 0x6, "88dc4f", 0x18, 0x2c, 0x0, @remote, @mcast2, {[@dstopts={0x3c}], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "96e266"}}}}}}}, &(0x7f0000000040)={0x0, 0x4, [0x0, 0x180000ceb]}) 07:01:15 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 329.472100][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 329.488835][T15333] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 329.504695][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 329.550439][T15337] FAT-fs (loop3): invalid media value (0x00) 07:01:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4800, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x10, 0x803, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) sendto(r5, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x8000, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x22, &(0x7f0000000140)=0x5, 0x91) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r8 = socket$pptp(0x18, 0x1, 0x2) dup3(r7, r8, 0xe1bbc6b76b7eccae) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0xfffffffc, @rand_addr="1b12cf5ce64c304dc41c5634326f2bbb"}, 0xffffffffffffffba) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x14, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 329.616784][T15337] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:15 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:01:15 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x3c, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 329.771823][T15354] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000200)) ptrace(0x10, r3) wait4(0x0, 0x0, 0x40000000, 0x0) tkill(r0, 0x9) 07:01:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4b00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(r1, &(0x7f0000002440)=[{{0x0, 0x0, 0x0}}], 0x4d7, 0x0, 0x0) 07:01:15 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x60, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 330.142231][T15373] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4c00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:16 executing program 3: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x8000}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000280)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() socket(0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f", 0x1f}}}, 0x30) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 07:01:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xf0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 330.365375][T15391] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 330.381722][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = io_uring_setup(0xa4, &(0x7f0000000100)) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000000)=r3, 0x1) 07:01:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x6000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:16 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 330.516591][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x300, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:16 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 330.681281][T15406] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x6800, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x500, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:16 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = io_uring_setup(0xa4, &(0x7f0000000100)) r3 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000000)=r3, 0x1) [ 331.007044][T15426] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:17 executing program 3: 07:01:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x6c00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x600, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)={'nat\x00', 0x8f, "8c893fe2c012f95e346561cb86931c89c898a53c6e3f0c52eeead8c5fcb4d590ac2247e22ec853cdcdaa5d9ef821f4b3e32a5707d173fe642fe55c86b8082efc0dee2c83cedede3e0f032d739d07a39645392cc73d99bf76bb3dc3a7def302bf6797d056296116b9994e23c2b37cdf4ee135b808017892193faec666327f33236b1038a725d700cc22f61054c21b33"}, &(0x7f0000000280)=0xb3) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0xeedf6207bad878d7, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00') accept4$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000100)=""/54) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:17 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r2, r1, 0x8, 0x0) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000004c0)="06", 0x1}], 0x1, 0x0) 07:01:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x900, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 331.391615][T15447] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:17 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, 0x0) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) prctl$PR_SET_PDEATHSIG(0x1, 0x0) 07:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x80000) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200), 0xffffffffffffff51) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f00000010c0)=0x55e7, 0x4) 07:01:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x7400, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) 07:01:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xa00, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:17 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 331.688222][T15466] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xb00, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 331.820406][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x7a00, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:17 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, 0x0) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) prctl$PR_SET_PDEATHSIG(0x1, 0x0) 07:01:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xe00, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:17 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f00000001c0)) 07:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0) [ 331.986692][T15485] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xf00, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:18 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, 0x0) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) prctl$PR_SET_PDEATHSIG(0x1, 0x0) 07:01:18 executing program 1: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) ftruncate(r0, 0x0) 07:01:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) getrusage(0x1, &(0x7f0000000140)) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) write$P9_RMKNOD(r2, &(0x7f0000000100)={0x14, 0x13, 0x1, {0xc8, 0x3, 0x1}}, 0x14) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x34000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x1100, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:18 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f00000001c0)) 07:01:18 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, 0x0) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) prctl$PR_SET_PDEATHSIG(0x1, 0x0) 07:01:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x400300, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000400)={0x0, 0x7f, 0x1, &(0x7f0000000280)=0x3}) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_BUFS(r5, 0xc0206416, &(0x7f0000000100)={0x80000001, 0xa2, 0x10001, 0x0, 0x1, 0x21}) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f00000000c0)=0x7fff, 0x4) r7 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="20002000a0630f4d379433dd89bf8d3dd0892875873eab4c526c90", @ANYRES16=r7, @ANYBLOB="000126bd7000ffdbdf25030000000c000800ff00000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x4010}, 0x50000) 07:01:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x1200, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) 07:01:18 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f00000001c0)) [ 332.957450][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf0ffff, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x2000, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0xfffffffffffffec9) [ 333.060967][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x1300, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000200)={0x2f, @loopback, 0x4e21, 0x2, 'none\x00', 0xc, 0x81, 0x1e}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'eql\x00', 0x1}, 0x18) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x2, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r5, 0xc008ae09, &(0x7f0000000300)=""/2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x1d, &(0x7f0000000080), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000600)=@nat={'nat\x00', 0x1b, 0x5, 0x638, 0x0, 0x138, 0x400, 0x0, 0x0, 0x568, 0x568, 0x568, 0x568, 0x568, 0x5, &(0x7f0000000240), {[{{@ipv6={@loopback, @empty, [0xffffffff, 0xff000000, 0x757313b1e68060e5], [0xffffff00, 0xffffff00, 0xff000000, 0xffffffff], 'veth1_to_bond\x00', 'vcan0\x00', {0xff}, {0xff}, 0x84, 0x7, 0x6, 0x20}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x8, 0x1, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x10, @ipv6=@mcast1, @ipv6=@mcast2, @icmp_id=0x64, @gre_key=0x173e}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1f}, @mcast1, [0xffffff00, 0xff000000, 0x0, 0xff], [0xffffffff, 0xe55e5ba7a880abf0, 0x623a8255e44539d0, 0xffffffff], 'batadv0\x00', 'veth0\x00', {}, {0x1fe}, 0x87, 0x1, 0x4, 0x4}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x20, 0x4}}, @common=@inet=@set1={0x28, 'set\x00', 0x1, {{0x11, 0x6, 0x8}}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@mcast2, @ipv6=@dev={0xfe, 0x80, [], 0x13}, @icmp_id=0x68, @icmp_id=0x67}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x11, 0x9, 0x9b}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x4d5, 0x4d6, 0xc96b, 0x6, 0x2}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1, @ipv6=@rand_addr="5bdbe1710c4b1e2a18ab9810a67ba180", @ipv4=@multicast1, @gre_key=0x800, @gre_key=0x4}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1d}, @mcast2, [0x0, 0xffffff00, 0xff000000, 0xffffff00], [0xff000000, 0xff, 0x7fffffff], 'ip6erspan0\x00', 'batadv0\x00', {0xff}, {0x1fe}, 0x84, 0x6, 0x1, 0x1}, 0x0, 0x140, 0x168, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x0, 0xbd1, 0x8, 0x6}}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x3, 0x5, 0x1, [0xffe0, 0x1, 0x2, 0x8, 0x18, 0x5fb, 0x0, 0x8, 0xfac1, 0x4, 0x1000, 0x9, 0x9, 0xfff9, 0x9, 0x8]}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x5d, 0x1, 0x5}, {0x9, 0x7, 0x1}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x698) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) ioctl(r8, 0x1000008912, &(0x7f0000000100)="11dc830b5e0bc9e47bf070c0f87845034a1f419e03c305049e91d32844ef2b42c9f461cc6a4a0f84d98156c2c519d0819a829b732c553fbf38df09b148a3025927a6b4f92a9194374299237b84ef5f59f295efed3640a838a1a962cb0ec42eab998eb6cd1011210a25c0c33879bdd3011db42814dc8fcdca7970466fb2e47db43d964bfff2d449de4b4f1681a463f5000000") setsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f00000000c0)=0xff, 0x4) 07:01:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x1000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x1400, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:19 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x2000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 333.400279][T15570] IPVS: set_ctl: invalid protocol: 47 127.0.0.1:20001 [ 333.484001][T15570] Unknown ioctl -1073172983 07:01:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x3c00, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x3000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 333.562004][T15570] IPVS: set_ctl: invalid protocol: 47 127.0.0.1:20001 [ 333.594401][T15575] Unknown ioctl -1073172983 07:01:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_TRY_ENCODER_CMD(r5, 0xc028564e, &(0x7f00000000c0)={0x8f225cb037be7566, 0x0, [0xffffed60, 0xa6fc, 0x3, 0x8001, 0x8000, 0x7, 0xc0, 0x3ff]}) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e7f4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b958500"/202], 0x48}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r9, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x3f00, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:19 executing program 3: 07:01:19 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:19 executing program 1: 07:01:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x4000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 334.050032][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x5000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:19 executing program 1: [ 334.137316][T15612] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:935 [ 334.147113][T15612] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 15612, name: syz-executor.0 [ 334.156640][T15612] 2 locks held by syz-executor.0/15612: [ 334.162195][T15612] #0: ffffffff89997aa0 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 334.171183][T15612] #1: ffff8880664582c0 (&(&sch->q.lock)->rlock){+...}, at: sfb_change+0x257/0xe90 [ 334.180772][T15612] Preemption disabled at: [ 334.180798][T15612] [] sfb_change+0x257/0xe90 [ 334.191315][T15612] CPU: 1 PID: 15612 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 334.198865][T15612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.208944][T15612] Call Trace: [ 334.212262][T15612] dump_stack+0x172/0x1f0 [ 334.216622][T15612] ? sfb_change+0x257/0xe90 [ 334.221927][T15612] ___might_sleep.cold+0x1fb/0x23e [ 334.227075][T15612] __might_sleep+0x95/0x190 [ 334.231625][T15612] __mutex_lock+0xc5/0x13c0 [ 334.236156][T15612] ? tcf_chain0_head_change_cb_del.isra.0+0x34/0x3e0 [ 334.242963][T15612] ? save_stack+0x5c/0x90 [ 334.247308][T15612] ? save_stack+0x23/0x90 [ 334.251661][T15612] ? mutex_trylock+0x2d0/0x2d0 [ 334.255793][T15616] validate_nla: 11 callbacks suppressed [ 334.255803][T15616] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 334.256468][T15612] ? fifo_set_limit+0x1a9/0x210 [ 334.256527][T15612] ? fifo_create_dflt+0x90/0xf0 07:01:20 executing program 3: [ 334.273397][T15616] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 334.275976][T15612] ? sfb_change+0x18d/0xe90 [ 334.275995][T15612] ? tc_modify_qdisc+0xfcf/0x1c50 [ 334.276013][T15612] ? rtnetlink_rcv_msg+0x463/0xb00 [ 334.276028][T15612] ? netlink_rcv_skb+0x177/0x450 [ 334.276040][T15612] ? rtnetlink_rcv+0x1d/0x30 [ 334.276053][T15612] ? netlink_unicast+0x531/0x710 [ 334.276066][T15612] ? netlink_sendmsg+0x8a5/0xd60 [ 334.276080][T15612] ? sock_sendmsg+0xd7/0x130 [ 334.276092][T15612] ? ___sys_sendmsg+0x803/0x920 [ 334.276103][T15612] ? __sys_sendmsg+0x105/0x1d0 [ 334.276126][T15612] ? __x64_sys_sendmsg+0x78/0xb0 [ 334.342327][T15612] ? do_syscall_64+0xfa/0x760 [ 334.347022][T15612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.353205][T15612] ? __kasan_check_read+0x11/0x20 [ 334.358254][T15612] ? mark_lock+0xc2/0x1220 [ 334.362703][T15612] mutex_lock_nested+0x16/0x20 [ 334.367576][T15612] ? mutex_lock_nested+0x16/0x20 [ 334.372534][T15612] tcf_chain0_head_change_cb_del.isra.0+0x34/0x3e0 [ 334.379073][T15612] ? __kasan_check_read+0x11/0x20 [ 334.384136][T15612] ? mark_lock+0xc2/0x1220 07:01:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x6000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:20 executing program 1: [ 334.388809][T15612] tcf_block_put_ext.part.0+0x2a/0x80 [ 334.395437][T15612] tcf_block_put+0xbf/0x110 [ 334.399969][T15612] ? tcf_block_put_ext+0x40/0x40 [ 334.405103][T15612] ? sfb_destroy+0x80/0x80 [ 334.409545][T15612] ? sfb_destroy+0x80/0x80 [ 334.413984][T15612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.420247][T15612] ? prandom_u32+0x7d/0xb0 [ 334.424690][T15612] ? sfb_zero_all_buckets+0x20/0x20 [ 334.429920][T15612] sfb_destroy+0x37/0x80 [ 334.434187][T15612] qdisc_destroy+0x11f/0x630 [ 334.438803][T15612] qdisc_put+0x85/0xa0 [ 334.442885][T15612] sfb_change+0x3d8/0xe90 [ 334.447238][T15612] ? write_comp_data+0x70/0x70 [ 334.452303][T15612] ? sfb_graft+0x5f0/0x5f0 [ 334.456842][T15612] ? nla_strcmp+0xe3/0x120 [ 334.461279][T15612] ? sfb_graft+0x5f0/0x5f0 [ 334.465720][T15612] tc_modify_qdisc+0xfcf/0x1c50 [ 334.470610][T15612] ? qdisc_create+0x1210/0x1210 [ 334.475515][T15612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 334.481797][T15612] ? qdisc_create+0x1210/0x1210 07:01:20 executing program 3: [ 334.486665][T15612] rtnetlink_rcv_msg+0x463/0xb00 [ 334.491624][T15612] ? rtnl_bridge_getlink+0x910/0x910 [ 334.496936][T15612] ? netlink_deliver_tap+0x22d/0xbf0 [ 334.502254][T15612] ? find_held_lock+0x35/0x130 [ 334.507052][T15612] netlink_rcv_skb+0x177/0x450 [ 334.511836][T15612] ? rtnl_bridge_getlink+0x910/0x910 [ 334.517139][T15612] ? netlink_ack+0xb50/0xb50 [ 334.521766][T15612] ? __kasan_check_read+0x11/0x20 [ 334.526813][T15612] ? netlink_deliver_tap+0x254/0xbf0 [ 334.532121][T15612] rtnetlink_rcv+0x1d/0x30 [ 334.536565][T15612] netlink_unicast+0x531/0x710 [ 334.541351][T15612] ? netlink_attachskb+0x7c0/0x7c0 [ 334.546484][T15612] ? _copy_from_iter_full+0x25d/0x8c0 [ 334.551875][T15612] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 334.557613][T15612] ? __check_object_size+0x3d/0x437 [ 334.562830][T15612] netlink_sendmsg+0x8a5/0xd60 [ 334.567875][T15612] ? netlink_unicast+0x710/0x710 [ 334.571397][T15622] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 334.572818][T15612] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 334.572836][T15612] ? apparmor_socket_sendmsg+0x2a/0x30 [ 334.572862][T15612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.598214][T15612] ? security_socket_sendmsg+0x8d/0xc0 [ 334.604202][T15612] ? netlink_unicast+0x710/0x710 [ 334.609155][T15612] sock_sendmsg+0xd7/0x130 [ 334.613582][T15612] ___sys_sendmsg+0x803/0x920 [ 334.618282][T15612] ? copy_msghdr_from_user+0x440/0x440 [ 334.623771][T15612] ? __kasan_check_read+0x11/0x20 [ 334.628824][T15612] ? __fget+0x384/0x560 [ 334.633006][T15612] ? ksys_dup3+0x3e0/0x3e0 [ 334.637457][T15612] ? __fget_light+0x1a9/0x230 [ 334.642418][T15612] ? __fdget+0x1b/0x20 [ 334.646512][T15612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 334.652781][T15612] __sys_sendmsg+0x105/0x1d0 [ 334.657397][T15612] ? __sys_sendmsg_sock+0xd0/0xd0 [ 334.662440][T15612] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 334.667914][T15612] ? do_syscall_64+0x26/0x760 [ 334.672607][T15612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.678696][T15612] ? do_syscall_64+0x26/0x760 [ 334.683398][T15612] __x64_sys_sendmsg+0x78/0xb0 [ 334.688178][T15612] do_syscall_64+0xfa/0x760 [ 334.692699][T15612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.698603][T15612] RIP: 0033:0x459a29 [ 334.702505][T15612] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.722115][T15612] RSP: 002b:00007f9d773ffc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 334.722132][T15612] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 07:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:20 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:20 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000100)={@empty, @multicast2, @broadcast}, &(0x7f0000000200)=0xc) r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001480)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r5, @ANYBLOB="3a0426bd7000fddbdf2503000000500004000c00010073797a31000000000c00070008000100100000000c00010073797a30000000001400070008000300a5000000080001001e00000014000700080004000200000008000300ee0000003c00090008000100090000000800020004000000b430ed4ab954aee36a08000100010001000800020000000000080002003d0a000008000100ff7f00000800020071030000db91ea4ac8cfb136f03a73c6ed46821a7d4ed5e62a8e409ffe5bfc769056e277ce93f0ef47842d22d6ee400e28e7d5fa3552308431a6a533def61268c32537976e0ffd5c649064bc832b213edcaf8ce0c0f3898c53856b492dec4431c7563c6df2799f190a3a11ee7036d533511ce3640652e1c328e16ec7073050925eb3defd6a948ffcde3022310235f8fee101085f11819d3a3c84b02f70146b8ff6efedc2f9d00bc3e036b376bbd2f308441a9a5238d7db07e82a840f43b20e991258b271990ce8306fdca64bbd7d819460"], 0x3}, 0x1, 0x0, 0x0, 0x44000}, 0x20008040) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r6 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r6, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r7 = userfaultfd(0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000002000)) openat$userio(0xffffffffffffff9c, &(0x7f0000001440)='/dev/userio\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @rand_addr=0x3ff}], 0x359) dup3(0xffffffffffffffff, r7, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:01:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x6000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x7000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:20 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 334.722140][T15612] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 000000000000000c [ 334.722147][T15612] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 334.722162][T15612] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d774006d4 [ 334.738520][T15612] R13: 00000000004c7979 R14: 00000000004dd398 R15: 00000000ffffffff [ 334.835835][T15634] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 334.856868][T15635] devpts: called with bogus options 07:01:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xf000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:20 executing program 1: 07:01:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x8000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = gettid() r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) r4 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x405, 0x3fdacf3fd329928c) r5 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x28dff1994266c2e8) kcmp(r2, r3, 0x3, r4, r5) r6 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x420800) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x40041, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r7, 0x4020565a, &(0x7f0000000240)={0x68fd6f2359c0d760, 0x3, 0x2}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, &(0x7f0000000100)={0x2, 0x8001}) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x191d01, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) ioctl$VT_WAITACTIVE(r6, 0x5607) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:20 executing program 3: 07:01:20 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:21 executing program 1: 07:01:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x34000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 335.260333][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x9000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:21 executing program 3: [ 335.309368][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x40, 0x1a9) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000000c0)={{0x2f, @multicast1, 0x4e23, 0x0, 'lblcr\x00', 0x4, 0x7, 0x77}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x4e24, 0x10000, 0x1, 0x9, 0x6}}, 0x44) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 335.420865][T15676] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:21 executing program 1: 07:01:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x400300, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:21 executing program 3: 07:01:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xa000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:21 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}, 0x0, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) [ 335.598407][T15684] IPVS: set_ctl: invalid protocol: 47 224.0.0.1:20003 07:01:21 executing program 1: [ 335.695412][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 335.736950][T15691] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 335.757574][T15695] IPVS: set_ctl: invalid protocol: 47 224.0.0.1:20003 07:01:21 executing program 3: 07:01:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xb000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 335.810077][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xf0ffff, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:21 executing program 1: 07:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0_to_bridge\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0x585}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004000) r5 = accept4(r4, 0x0, &(0x7f00000000c0), 0x40800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000100)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x18) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) [ 335.982436][T15705] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:21 executing program 3: 07:01:21 executing program 1: 07:01:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xe000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x1000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 336.132636][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:22 executing program 1: [ 336.203699][T15720] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:22 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}, 0x0, 0x0, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000100)=@security={'security\x00', 0xe, 0x4, 0x768, 0x410, 0x258, 0x0, 0x258, 0x258, 0x698, 0x698, 0x698, 0x698, 0x698, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x228, 0x258, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x6, 0xfffff92c, 0x7f, 0x8001, 0x63, 0x6, [@dev={0xfe, 0x80, [], 0x24}, @local, @empty, @remote, @rand_addr="40806496046bf97d9ec2e33a09da0ecc", @mcast1, @empty, @loopback, @remote, @empty, @dev={0xfe, 0x80, [], 0x1f}, @mcast2, @loopback, @ipv4={[], [], @local}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x18}], 0xc}}, @common=@inet=@tcpmss={0x28, 'tcpmss\x00', 0x0, {0x4, 0xac7, 0x1}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x5, 0xea, 0x7}, {0x2, 0x9, 0x1}, 0xab9d652, 0xd855}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xa}, @mcast1, [0xff, 0x0, 0xff000000, 0x62f03187ff10dac4], [0xffffff00, 0x807fff00, 0xffffff00, 0xa6e43f57965c8a28], 'bridge0\x00', 'eql\x00', {0xff}, {}, 0x21, 0x9, 0x0, 0x36}, 0x0, 0x180, 0x1b8, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x20, 0x18}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x1, 0x75, 0x5, 0x7, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, [0x0, 0xffffffff, 0xff, 0xffffff00], [0x1fe000000, 0x0, 0xff000000], [0xffffffff, 0xff000000, 0xff000000, 0xffffffff], 0x259ccb696b3d9776, 0x316}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x1ff, 0x80, 0x4}, {0x81, 0x2, 0x1}, {0x4, 0x80, 0xfd}, 0x8, 0x3}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x28}, @remote, [0xff000000, 0xffffffff, 0xffffffff, 0xb5f62cf4fe9ad968], [0xff000000, 0x0, 0xffffff00, 0xff000000], 'bcsh0\x00', 'ip6gre0\x00', {0xff}, {0xff}, 0x3c, 0x80, 0x8, 0x380141fee0e2f44b}, 0x0, 0x248, 0x288, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x8, 0x4, 0x3a6d337ad765247e, [0x138f, 0x4, 0x6, 0x80, 0x9, 0x40, 0x100, 0x6, 0x13c, 0x8000, 0x9d, 0x401, 0x7, 0x7400, 0x0, 0x8], 0x10}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x9, 0x9e, 0x7f, 0x6, 0x1, 0x249365fd19036ed4, [@dev={0xfe, 0x80, [], 0x1b}, @loopback, @mcast2, @local, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}, @dev={0xfe, 0x80, [], 0x26}, @ipv4={[], [], @empty}, @mcast1, @dev={0xfe, 0x80, [], 0x21}, @empty, @dev={0xfe, 0x80, [], 0x1a}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}], 0x6}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x6, 0x2, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800000000002, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) 07:01:22 executing program 3: [ 336.390065][T15730] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:22 executing program 1: 07:01:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x2000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 336.484604][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x10000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:22 executing program 3: [ 336.603368][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:01:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) 07:01:22 executing program 1: [ 336.693473][T15747] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x3000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x11000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:22 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:22 executing program 3: 07:01:22 executing program 1: 07:01:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x4000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:22 executing program 0: 07:01:22 executing program 3: 07:01:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x12000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:23 executing program 1: 07:01:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x5000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:23 executing program 3: 07:01:23 executing program 0: 07:01:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x13000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:23 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:23 executing program 1: 07:01:23 executing program 0: 07:01:23 executing program 3: 07:01:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x14000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x6000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:23 executing program 3: 07:01:23 executing program 1: 07:01:23 executing program 0: 07:01:23 executing program 3: 07:01:23 executing program 0: 07:01:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x8000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:23 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}}, &(0x7f00000001c0)=0x98) 07:01:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x20000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:23 executing program 1: 07:01:24 executing program 0: 07:01:24 executing program 1: 07:01:24 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_elf64(r3, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0xdb, 0x7, 0x0, 0x9, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x40}, [{0x0, 0x2, 0x0, 0x2de8000000000000, 0xd56, 0x0, 0x100000000000000, 0x97}], "9e64324e3091256664503422288e39936cf082160540a7730ff420a859842812260b0f35d92b56dee50debb495b8bbc318c6d2eb475f5821af5111c9a3b0ffba5f9ef81aeb9478bbd3830f9bab3a0f3baa408dedbff0d38c0536788c78293145d37045fe9e6d53ed0eeb3efd63f5fc0ee96d20729558676b883763e814d05e895214322be8a0f96f1b78a094c480d62cb2", [[], [], [], [], [], [], []]}, 0x809) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xa0', 0x4004) 07:01:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x40000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x9000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:24 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xa000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(r1, &(0x7f0000002440)=[{{0x0, 0x0, 0x0}}], 0x4d7, 0x0, 0x0) 07:01:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x48000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:24 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}}, 0x0) 07:01:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:24 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xb000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4b000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xe000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x4c000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:24 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xf000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x76, &(0x7f0000000080)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:25 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}}, 0x0) [ 339.322122][T15888] validate_nla: 13 callbacks suppressed [ 339.322134][T15888] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:25 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x60000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 339.511269][T15891] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. 07:01:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x10000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:25 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ftruncate(r0, 0x0) [ 339.737614][T15914] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x68000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 339.849147][T15912] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 07:01:25 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback}}}, 0x0) 07:01:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x11000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:25 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ftruncate(r0, 0x0) [ 340.052865][T15927] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x6c000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 340.159180][T15931] FAT-fs (loop3): count of clusters too big (4294952127) [ 340.194527][T15931] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x76, &(0x7f0000000080)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x12000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:26 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ftruncate(r0, 0x0) 07:01:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 340.356814][T15944] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x74000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 340.533430][T15955] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 340.571155][T15952] FAT-fs (loop3): count of clusters too big (4294952127) 07:01:26 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x13000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 340.618864][T15952] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 340.699221][T15963] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x7a000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x14000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 340.916760][T15982] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 340.984089][T15978] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 341.048353][T15981] FAT-fs (loop3): count of clusters too big (4294952127) [ 341.096703][T15981] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x76, &(0x7f0000000080)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:27 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x9effffff, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x3c000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) [ 341.358314][T16003] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 341.386339][T16005] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 07:01:27 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x3f000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 07:01:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf0ffffff, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 341.591346][T16013] FAT-fs (loop3): count of clusters too big (4294952127) [ 341.655644][T16013] FAT-fs (loop3): Can't find a valid FAT filesystem 07:01:27 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x0) [ 341.726827][T16021] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 07:01:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x40000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 341.791057][T16031] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:01:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 07:01:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xfffff000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x60000000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:27 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xffffff7f, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:28 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0x9effffff, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:28 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 07:01:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xffffff9e, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 342.579686][T16070] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 07:01:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xf0ffffff, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x0) 07:01:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 07:01:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xfffffff0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:28 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xfffff000, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x40030000000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x0) 07:01:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 07:01:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xffffff7f, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) [ 343.324691][T16118] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 07:01:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080)=0x1, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80100, 0x0) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) syz_mount_image$minix(&(0x7f00000010c0)='minix\x00', &(0x7f0000001100)='./file0\x00', 0x17786b31, 0x2, &(0x7f00000012c0)=[{&(0x7f0000001140)="4bc938c0f87373a17564714c9bc45dbb2f89cd281639e6b90c923cabee8bee5574f5eaaaa99eb4d246f7460bf15211daabb7123d99313c7098bf67666181fd58372cf38f26af1f336b5c31fb80897c8da93e03263e29ad4a2014504eb4b960de5ae011bd89fcc76004d7f957af5d1732091f56c2ef17785cccf66c37de44c1d394deed24210658024a62ed2853517f36a9566cfb3377af3bd4bebfa2765cc3da49e90aa7f18b0eb3124a3d646833307575f10da04fce83842a35a3e553d0bf8c", 0xc0, 0xff}, {&(0x7f0000001200)="8fcdd94a709592785dffb507dee9818ad837f0664f2615121bc776ca9cf18e475e4eda8906b6741e481958c4e2781938d4d154a11829c483d209e16b07bfd9a75658403e80a856f6437fb744d653e6354ad737d6264108094209fc1429444893dd59f16907a53fff1b9f480e235707ebe71a89675a8b343d7bcefc46806dbae3a927030d00cf2734df392bcef3aea51da17d702176fa57816a194dce9e77729dc61e635af2eacc140f0bc7444022d4a0c2", 0xb1, 0x1}], 0x1810004, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @loopback}}, 0xf1, 0x3, 0x9, 0x8822, 0x80000001}, &(0x7f00000001c0)=0x98) 07:01:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x0) 07:01:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0xf0ffffffffffff, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xffffff9e, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 07:01:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x100000000000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 07:01:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x18, 0x2, 0x9, 0x800000001, 0x0, 0xfffffff0, {}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 07:01:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed0100000000f8", 0x16}], 0x0, 0x0) 07:01:29 executing program 0: r0 = mq_open(0x0, 0x42, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r0, 0x0) 07:01:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(0x0) 07:01:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000bfdfdc)={0x20, 0x2, 0x9, 0x800000001, 0x200000000000000, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 344.051861][T16165] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1.