uting program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000008300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:02 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80000) write$binfmt_aout(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x5cb) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0x154, 0x154, 0x154, 0x154, 0x154, 0x3cc, 0x3cc, 0x3cc, 0x3cc, 0x3cc, 0x5, &(0x7f0000000100), {[{{@ip={@loopback, @multicast1, 0xffffff00, 0xffffffff, 'tunl0\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x7f, 0x1, 0x4}, 0x0, 0x120, 0x154, 0x0, {}, [@common=@unspec=@rateest={0x5c, 'rateest\x00', 0x0, {'syzkaller0\x00', 'rose0\x00', 0x20, 0x3, 0x800, 0x8, 0x0, 0x8, 0x10000}}, @common=@ah={0x2c, 'ah\x00', 0x0, {0x4, 0x3ff, 0x1}}]}, @SNAT0={0x34, 'SNAT\x00', 0x0, {0x1, {0x11, @remote, @multicast2, @port=0x4e22, @gre_key=0x8}}}}, {{@uncond, 0x0, 0x98, 0xcc}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x14, @loopback, @broadcast, @gre_key=0x10000, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv4=@multicast2, @ipv4=@rand_addr=0x1, @icmp_id=0x67, @gre_key=0xac}}}, {{@uncond, 0x0, 0x98, 0xcc}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x3, @local, @multicast1, @gre_key=0x1000, @gre_key}}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x4bc) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) 03:41:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x2) 03:41:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x400000000000000) 03:41:02 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001000)={{{@in6=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001100)=0xe8) sendmsg(r0, &(0x7f00000012c0)={&(0x7f0000001140)=@xdp={0x2c, 0x1, r2, 0x38}, 0x80, &(0x7f0000001200)=[{&(0x7f00000011c0)="d94714cc6d2e1869953fe7b68c4dc8f0", 0x10}, {&(0x7f0000001700)="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", 0x1000}], 0x2, &(0x7f0000001240)=[{0x38, 0x109, 0x7, "149643ae225bfcf2d76eb64d195087e9b8311366b78ddab021af9e65498092c6b1d34373628224fc929ba7"}, {0x20, 0x104, 0x7fffffff, "1c735c8fa80a18a70bdb296c256649656f4ec3"}], 0x58, 0x4000}, 0x4) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) timer_create(0x7, &(0x7f0000000380)={0x0, 0x2, 0x2, @thr={&(0x7f0000000100)="0ede6e8ced7179e8eb40ea12a7bf27ffe9b1d340ce8dccc524e117dab45a09e615f5fe93bc14dc8eed46432334425063d9f9e7147ee455966d8eca415abf4096871798ac21689633f7a7", &(0x7f0000000180)="a3a83090c2d470907676864fe07aca32a2eb60beea5d83f045cebdf059336770262daed9"}}, &(0x7f00000003c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:02 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x2100000000000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0e05403, &(0x7f0000000140)={{0x0, 0x2, 0x2, 0x3, 0xffffffff}, 0x7f, 0x6, 'id1\x00', 'timer1\x00', 0x0, 0x4, 0x7, 0x9, 0x1b}) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000002c0)=""/131, &(0x7f0000000380)=0x83) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x3}}, 0x20) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xe6c1, 0x2000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={@mcast2, 0x4f, r2}) 03:41:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f767469300000008fcea73b00", @ifru_flags}) 03:41:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x800000000000000) 03:41:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f76746930000000008fcea73b00", @ifru_flags}) 03:41:02 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x6, 0x12080) poll(&(0x7f0000000080)=[{r0, 0xc604}], 0x1, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000000)) setsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f0000000100)=0x1, 0x4) 03:41:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000fc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x40000) 03:41:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f76746930000000003ba7ce8f00", @ifru_flags}) 03:41:03 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0xfffffffffffffe59, 0x4000090, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x34e) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/98) socket$bt_bnep(0x1f, 0x3, 0x4) 03:41:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x8100) 03:41:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f7674693000000000000000008f", @ifru_flags}) 03:41:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4c00) 03:41:03 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) 03:41:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x4000000001) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f7674693000000000003ba7ce8f", @ifru_flags}) 03:41:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x600000000000000) 03:41:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000000)) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:03 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fchown(r0, r1, r2) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x3, 0x5, 0x1, 0x1, 0x401, 0x1}, 0x9}, 0xa) 03:41:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ba00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x3f000000) 03:41:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f7674693000000000008fcea73b", @ifru_flags}) 03:41:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x400300) 03:41:03 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f767469300000000000008fcea7", @ifru_flags}) 03:41:04 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000000)=""/105) [ 806.261050] validate_nla: 9 callbacks suppressed [ 806.261061] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:04 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3ff) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x101080, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x402000, 0x0) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f0000000100)={0x1800000000000000, 0x3002, 0x847f, 0x3, 0xb}) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000b700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000e300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:04 executing program 5: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x3) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000100)) 03:41:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x3f00000000000000) 03:41:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f767469300000000000003ba7ce", @ifru_flags}) 03:41:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 806.909883] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xfffffff0) 03:41:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:04 executing program 5: ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000100)) 03:41:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f76746930000000000000003ba7", @ifru_flags}) [ 807.073132] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:05 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = openat(r3, &(0x7f0000000140)='./file0/file0\x00', 0xa0400, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00') write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x80, r5, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x82}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x18a}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x28}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x4004) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:05 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f00000051c0)=[{{&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, &(0x7f0000000180)=""/34, 0x22, 0x5}, 0x5}, {{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)=""/189, 0xbd}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/179, 0xb3}, {&(0x7f00000004c0)=""/187, 0xbb}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f00000005c0)=""/123, 0x7b}], 0x6, 0x0, 0x0, 0x3}, 0xffff}, {{&(0x7f0000000680)=@hci, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000700)=""/169, 0xa9}, {&(0x7f00000007c0)=""/24, 0x18}, {&(0x7f0000000800)=""/54, 0x36}, {&(0x7f0000000840)=""/36, 0x24}, {&(0x7f0000000880)=""/131, 0x83}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/154, 0x9a}], 0x7, 0x0, 0x0, 0x1}, 0x3}, {{&(0x7f0000001a40)=@xdp, 0x80, &(0x7f0000003f80)=[{&(0x7f0000001ac0)=""/35, 0x23}, {&(0x7f0000001b00)=""/132, 0x84}, {&(0x7f0000001bc0)=""/255, 0xff}, {&(0x7f0000001cc0)=""/32, 0x20}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/144, 0x90}, {&(0x7f0000002dc0)=""/110, 0x6e}, {&(0x7f0000002e40)=""/71, 0x47}, {&(0x7f0000002ec0)=""/4096, 0x1000}, {&(0x7f0000003ec0)=""/182, 0xb6}], 0xa, 0x0, 0x0, 0x7}}, {{&(0x7f0000004000)=@l2, 0x80, &(0x7f00000050c0)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/58, 0x3a}], 0x2, &(0x7f0000005100)=""/133, 0x85, 0xff}, 0x5}], 0x5, 0x2, &(0x7f0000005280)) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f00000052c0)) 03:41:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x1000000000000000) 03:41:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000e900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 807.866711] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f76746930000000000000008fce", @ifru_flags}) 03:41:05 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x1b}, 0x190, 0x3, 0x3, 0x2, 0x3, 0x7, 0x20}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xf9, "c0aba381a6316c531a2d05ba0b583901b18bb264881b35e3d0ecd85619247b78fccf9ca7812c180302c2e0d6d599dfaaa159599813782a3af6284e9f798b39576ce04eff10a9bd1c1e391b5707ba1f083fba756ce6c97eab27728f590f675ad99f0daecec069dda01fc5f67a6a75ea7a6f8a295fd4adc6f9bd362c6cb75603954e47d85aa3087a1fedd4b747f09159b5aa0f94a8feb4271cbc2d0e76cc0a1a8b35f581e1dc8816cfdf29cc031094d980691a5517897b0f87bd64b956e62b02ae025ac8a9df53b954154cec46944513724bfb1decc23f8d72eefe803cbbb4b8a88b816beac4683fca30ea457b09f7deb102f2615e1e581ab6cf"}, &(0x7f0000000340)=0x101) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={r1, 0x4e}, &(0x7f00000003c0)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r2, r0}}, 0x18) 03:41:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x3000000) 03:41:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000aa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 808.060226] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:06 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000000140)={0x2, 0x800004e27, @multicast2}, 0x10000028d) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r3, 0x200}, &(0x7f0000000380)=0x8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) ustat(0x9, &(0x7f00000003c0)) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:06 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x80001) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x7a000000) 03:41:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00;', @ifru_flags}) 03:41:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 808.836622] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:06 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x400854d6, 0x0) 03:41:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x6) 03:41:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f7674693000000000000000008f", @ifru_flags}) 03:41:06 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x801fffffffffff, &(0x7f0000000100)=0x82, 0xfe00) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:06 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0x43, 0x7f, 0x2, 0x4, 0x3}) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x800006, 0x4) [ 809.064436] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000b200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags=0x8fcea73b}) 03:41:06 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) poll(&(0x7f0000000080)=[{r0}, {r0, 0x10}, {r0, 0x4022}, {r0, 0x100}], 0x4, 0x90) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000140)=""/175, &(0x7f0000000000)=0xaf) sysinfo(&(0x7f0000000200)=""/205) 03:41:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x9effffff00000000) 03:41:07 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000140)) 03:41:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf00000000000000) 03:41:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 809.328333] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags=0x3ba7ce8f00000000}) 03:41:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 809.438960] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:07 executing program 2: getitimer(0x0, &(0x7f0000000000)={{0x0, 0x0}, {0x0, 0x0}}) r4 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r5 = socket$inet(0x2, 0x4000000000000001, 0x100000000) setsockopt$inet_tcp_int(r5, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r4, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYRES16=r1, @ANYRESOCT=r2, @ANYRESOCT=r1, @ANYRES16=r0, @ANYBLOB="cb1c60209f41d647b998b289a9ce99b1550f823e0dd3816487045871d25e424ecbe57c8e0c48bdef191d39f87a8e3feb241f113215c462371757517dd514971360ccc85f4d4fd90b7f02e5916c04360d792f9064a1965bea93e424980032a83f6bd5c46af0134b8a23f2ad04eda2610321d0f4f7650bc9201031a99a6c71159a9160792b101964048587cfd7fd9be12e62e48060d88a6b8c8c0c0627d3fbbdbc493e4b54cf8619086aebefb178c67f3b07f84123968d1e4b8fd8ce7ac08ef27467715dbaf61e9dc1bb21", @ANYRESOCT=r3], 0x6, 0x1) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r5, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r6}) fsetxattr$trusted_overlay_opaque(r5, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000040), 0x4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r7, 0x5425, 0x0) write$binfmt_elf64(r5, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:07 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) tee(r0, r0, 0x70af, 0x1) 03:41:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x3) 03:41:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags=0x3ba7ce8f}) 03:41:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:07 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) 03:41:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4c00000000000000) 03:41:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89bb, &(0x7f0000000040)={'gretap0\x00', @ifru_addrs=@ipx={0x4, 0x0, 0x3, "4bbb68450d97", 0x855}}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:08 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6, @in6=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000100)=""/17, 0x11) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) ioctl$sock_ifreq(r1, 0x89ee, &(0x7f0000000140)={'tunl0\x00', @ifru_addrs=@rc={0x1f, {0xfffffffeffffffff, 0x100, 0x81, 0x4, 0x1ff, 0x9}, 0x401}}) [ 810.260516] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:08 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000, 0x0) write$P9_RRENAME(r3, &(0x7f0000000140)={0x7, 0x15, 0x1}, 0x7) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x2) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000dc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:08 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x10002, 0x0) epoll_create1(0x80000) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x6) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x74080, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4000000) 03:41:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000fc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x8000, 0x20000) r2 = getpgrp(0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000100)=r2) 03:41:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4c000000) 03:41:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000e00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) socket(0x1, 0x3, 0x594) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000100)={'ip_vtb0\x00', @ifru_flags}) 03:41:08 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x1000, @remote, 0x1}], 0x1c) 03:41:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xd101) 03:41:09 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x800}, 0x2) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:09 executing program 1: r0 = socket(0x1000000000d, 0xe, 0xffffffffffffffff) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x1, 0xa, 0x100000000, 0x8, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1}, &(0x7f0000000140)=0x8) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000c800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ad00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:09 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000004, &(0x7f0000000680)=0x82, 0x311) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x490000, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000440)={0x8, 0x2, 0x1f, {r5, r6+30000000}, 0x2, 0x36e75db1}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r7, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) accept4(r2, &(0x7f00000000c0)=@l2, &(0x7f0000000140)=0x80, 0x80000) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000380)=0x1, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @broadcast}, 0x10) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x7400) 03:41:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 812.050489] validate_nla: 3 callbacks suppressed [ 812.050498] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:09 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x9}, 0x28, 0x1) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200000) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x7, 0xfffffffffffffffd, 0x3f, 0x5, 0x7}) 03:41:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xfffe) 03:41:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000fc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:10 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000300)={0x1, 0x2, 0x40}) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffffffff) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000240)=0xa3) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0}]}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000280)={0x30, 0x5, 0x0, {0x0, 0x2, 0x8001, 0x7ff}}, 0x30) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc008641d, &(0x7f00000002c0)={r2, &(0x7f0000000140)=""/235}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'ipddp0\x00'}) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000380)) [ 812.239309] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4000000000000000) 03:41:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x202, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000180)={0xfffffffffffffff7, 0x0, &(0x7f00000000c0)="46a19391df43fbd1504034e2a24f24129fb3fb6fc03d41860dabf3649ca2f324060a56e9f046bf81beeb", &(0x7f0000000100)="ab256c8bfe9f730cbb8beac16f2f0068f94a0ea9a2b9cce190606feb2d272234168170a77d7a47badbbe27c91496e87817ad6251c54e150f5cbbe31b07efd7c003f1cb0bcbd27c1c4ecc422032196a8d62b5db596a4a608fca5d060fef114182f6be230db2061f82f6bef0a6e3ca6b41ca048bee882286d63a42", 0x2a, 0x7a}) 03:41:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000de00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 812.424886] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) socket(0x13, 0x6, 0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_map={0x3ff, 0xb0, 0x5, 0x4, 0x40, 0x81}}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_hwaddr=@dev={[], 0x10}}) 03:41:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x300) 03:41:10 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:10 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/mixer\x00', 0x20000, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000580)=0x7, &(0x7f00000005c0)=0x4) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) getgroups(0x4, &(0x7f0000000700)=[0xee01, 0xee01, 0xffffffffffffffff, 0xee00]) getgroups(0x3, &(0x7f0000000740)=[0xee00, 0x0, 0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {0x1, 0x1}, [{0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x3, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x2, r7}], {0x4, 0x2}, [{0x8, 0x2, r8}, {0x8, 0x4, r9}, {0x8, 0x4, r10}, {0x8, 0x6, r11}, {0x8, 0x5, r12}], {0x10, 0x2}, {0x20, 0x3}}, 0x7c, 0x2) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000100)) [ 813.017684] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:10 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) 03:41:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x2}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) connect(r0, &(0x7f00000000c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(des3_ede),crc32)\x00'}, 0x80) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) bind$can_raw(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x6) 03:41:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x6c) 03:41:11 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0x2, 0x4) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000140)=[0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0xee01, 0xee01, 0x0]) fchown(r0, r1, r2) 03:41:11 executing program 1: r0 = socket(0xb, 0x3, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000001000)={0x2, {{0xa, 0x4e22, 0x100000001, @mcast2, 0x1000}}}, 0x84) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) clock_gettime(0x0, &(0x7f0000000f80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000f00)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/186, 0xba}, {&(0x7f0000000200)=""/84, 0x54}, {&(0x7f0000000280)=""/174, 0xae}, {&(0x7f0000000340)=""/171, 0xab}, {&(0x7f0000000400)=""/107, 0x6b}, {&(0x7f0000000480)=""/80, 0x50}], 0x6, &(0x7f0000000500)=""/90, 0x5a, 0x40}, 0x100000000}, {{&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/12, 0xc}, {&(0x7f00000007c0)=""/164, 0xa4}, {&(0x7f0000000880)=""/48, 0x30}, {&(0x7f00000008c0)=""/102, 0x66}], 0x6, &(0x7f0000000980)=""/123, 0x7b, 0x6}, 0x2c}, {{&(0x7f0000000a00)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a80)=""/230, 0xe6}, {&(0x7f0000000b80)=""/245, 0xf5}, {&(0x7f0000000c80)=""/230, 0xe6}, {&(0x7f0000000d80)=""/10, 0xa}], 0x4, &(0x7f0000000e00)=""/194, 0xc2, 0x9}, 0x7}], 0x3, 0x40000000, &(0x7f0000000fc0)={r1, r2+30000000}) 03:41:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 813.258285] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:11 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x4c, r1, 0x316, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x518c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4000000000000}]}, 0x4c}}, 0x20000000) 03:41:11 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) connect$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x7400000000000000) 03:41:11 executing program 1: r0 = socket(0x10, 0x40000003, 0xffff) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000600)='veth0_to_bond\x00') ioctl$sock_ifreq(r0, 0x89f2, &(0x7f00000005c0)={'ip_vti0\x00', @ifru_flags}) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7fffffff, 0x40000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getgroups(0x4, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01]) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@broadcast, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x58013, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}], [{@uid_lt={'uid<', r5}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@subj_type={'subj_type'}}, {@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ip_vti0\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r6}}, {@obj_user={'obj_user', 0x3d, 'ip_vti0\x00'}}]}}) 03:41:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:11 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1f, 0xffffffffffffffff) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ad00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:11 executing program 5: r0 = dup(0xffffffffffffff9c) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000100)) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x0, 0xf000, 0x80000001, 0x81, 0x200}) [ 814.015614] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/168, &(0x7f0000000000)=0x389) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={"78705f767469300400", @ifru_map={0x0, 0x7fff, 0x80000001, 0x6, 0x9, 0x6}}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x40030000000000) 03:41:12 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x1000000000000080) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) [ 814.196852] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:12 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x197, 0x7fffe) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000380)="a2cb3f376c1f3f8954911144ab389456575d889f9769ded7665b3fd76ea4822d3699b0211834c8c81193f22738c98432a0058b3c91ee0496fe69445b832437367eb7a056f2025312cda8b9e85202caf3c228fe892c8d86980c816f83ea930778dd82faeb00ea0979423d1a2ccfd156a2d689fe575d1236db117e6247c2ec1fd63f27512bf2294fdaa10420932d015ae43289fd5633df3adfd78756cfa5f600a59e70fd0cf085962bce2e47563b8441145a8999ede412c4dcfac41d1bb21a7b1b5a", 0xc1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:12 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='rose0\x00') socket$kcm(0x29, 0x2, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0xfffffffffffffffa, 0xfffffffffffffffb, 0x9, 0x7b980000, 0xffffffff, 0x5, 0x100000001, 0x4, 0x8, 0x4}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) 03:41:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xff0f0000) [ 814.970197] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:12 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/43, &(0x7f0000000040)=0x2b) 03:41:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x9effffff) 03:41:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x8, 0x4e}, &(0x7f0000000380), 0x1400) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4008641a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[0x0, 0x81]}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000002c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000300), &(0x7f00000005c0)=0x40) rt_sigsuspend(&(0x7f00000004c0)={0x7}, 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000), 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4004240b, &(0x7f0000000540)={0x1, 0x70, 0x57, 0x0, 0x8cd, 0xfff, 0x0, 0x6, 0x1104, 0x2, 0x0, 0xfffffffffffffffb, 0x8, 0x3ee2, 0x20, 0x2, 0x1, 0x26f1, 0x7ff, 0x35, 0x9, 0x6, 0xffffffffffff7fff, 0xf2c6, 0x0, 0x1, 0x80000001, 0x4, 0x4, 0x80, 0x97, 0x8, 0x7fff, 0x100, 0x7f, 0x5, 0x7a, 0xff, 0x0, 0x1f, 0x2, @perf_config_ext={0x20000000000000, 0x8}, 0x100, 0x4, 0x0, 0x6, 0x40, 0x8, 0x8001}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04000000000000000000000000000000000000000000000200000000000000c8bd8b48687aba2c2cd62cbba85b77852fe7468f423d01c2ca68654388c9242595b570eadc50ae2c817d401e82529bc32339c79431848f4552fcef325e7d499b58"]) write$binfmt_misc(r2, &(0x7f0000000440)=ANY=[@ANYBLOB='pyz1'], 0x1200e) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000500)={0x18, 0x0, 0x4, {0x6}}, 0x18) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000600)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x4, {0x9, 0x7fff, "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", 0x22, 0x7, 0x1, 0x778, 0x6, 0x5, 0x6}, r5}}, 0x128) chdir(&(0x7f0000000000)='./file0\x00') getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000180)={@empty, @remote, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$can_raw(r4, &(0x7f0000000480)={&(0x7f0000000200)={0x1d, r6}, 0x10, &(0x7f0000000340)={&(0x7f00000003c0)=@canfd={{0x0, 0x0, 0x7fffffff, 0x8}, 0x25, 0x1, 0x0, 0x0, "a5e3e6beddfd81ed41ddccc281a8597a1ad4bca9e5b21360b95c2384ed9bff8b181929dea8f5a20f236c6a00a1f681de86f4c46efaf2daa9e053aa68871f041a"}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0xfffffe82) ioctl$sock_ifreq(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', @ifru_hwaddr=@dev={[], 0x1d}}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:13 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x62, 0x8000, "701d0d38ce6b8ec75d2c2f522f723230753554b6aeb573930dd3aec036ab6874be0fe04d84edcf217e42d9bd5c4098e8350d46d22e8af3c090d57b7acb18be93a066ef046eb122ecfd956a86912d14769d6fc32340df15ce733d"}, 0xdcff8ba7083b4595) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x60000000) 03:41:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ca00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:13 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x81, 0x80) write$FUSE_BMAP(r0, &(0x7f0000000140)={0x18, 0x0, 0x5, {0x8}}, 0x18) r1 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40042406, &(0x7f0000000180)='trusted\x00') fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2000, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:13 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r0}}, 0x18) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) [ 815.963877] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:13 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 03:41:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x34000) 03:41:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 816.100455] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:13 executing program 1: r0 = socket(0x10, 0xa, 0xfffffffffffffffc) ioctl$sock_ifreq(r0, 0x8925, &(0x7f0000000180)={'nr0\x00', @ifru_flags=0x2100}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x6, 0x30, 0x79}, &(0x7f0000000000)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r1, 0xd24, 0x30, 0x4, 0xf88}, &(0x7f0000000140)=0x18) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000500)={0x0, 0xc0, &(0x7f0000000440)=[@in6={0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, [], 0x11}, 0x1}, @in6={0xa, 0x4e20, 0x2, @empty, 0x9}, @in6={0xa, 0x4e22, 0x8ec2, @loopback, 0x1}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x3, @loopback, 0x1}]}, &(0x7f00000002c0)=0xffffffffffffff36) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={r2, 0x20, &(0x7f0000000200)=[@in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21}]}, &(0x7f0000000280)=0xc) 03:41:13 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYRESOCT=r0, @ANYRES16=r1, @ANYBLOB="200426bd7000fddbdf2503000000080002000a000000080001004e220000080001004e20000008000400030000000800020002000000080003003b000000040005000800040001000000"], 0x3}, 0x1, 0x0, 0x0, 0x20008800}, 0x10) syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x10001, 0x4002) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0xc, 0x0, 0xffffffffffffff01}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000080)={0x100000000, 0xf004}) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x3, @ipv4={[], [], @multicast2}, 0x6}}, 0x5, 0x7fff}, &(0x7f00000002c0)=0x88) open_by_handle_at(r0, &(0x7f0000000380)={0x51, 0xf5b, "66f9b6b90de252d2a5e383375a357ed0a55e09ee94abb209a5bad713a940c93e0831bcabc9b5dd0046c47f2182fab5e667f7851ef8967fa60328108f441e0a2a85ba097687e7b246f6"}, 0x0) getsockname$netlink(r0, &(0x7f0000000140), &(0x7f0000000040)=0xc) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000180)=r0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000500)={'ip6gre0\x00', {0x2, 0x4e23, @loopback}}) 03:41:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x68) 03:41:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={"69705f763000000400", @ifru_addrs=@vsock={0x28, 0x0, 0xffffffff, @host}}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf0ffffffffffff) 03:41:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ip_vti0\x00', 0x8000}) getitimer(0x0, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:14 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) r1 = request_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='/dev/media#\x00', 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="040c7c8ba5cf4129b53f54694fcc1fa6022063a1789ff91d91e850f1edf6d7d36c00f52e2cdf5a45f5d343c108bd31eda82a04d876b7aa463dc828d4b1936e11d580de44f5dbbfc32b5ff03efdfc6ba44095466281d35862942e1adf18f7a2ded6356280807971f4a47a270f5061860ed4851c380388a9c4c5ff6673904500b610c09dee0dc2af9f60337a44c0928508ccd0e6e7cfd004bba5afbbb93d0b93627a85480c6d1460d98f1918b58cde1b95302173606eda18766602a051f24a878fa36ec7abbcd1e0d263bac757d161", 0xce, 0xfffffffffffffff8) keyctl$negate(0xd, r1, 0x0, r2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x4, 0x1, 0x800a, 0x2, 0x1000, 0x6, 0x3f, 0x80, 0x0}, &(0x7f0000000040)=0x20) socket$unix(0x1, 0x5, 0x0) write$apparmor_current(r0, &(0x7f00000003c0)=@profile={'stack ', 'selinux{\x00'}, 0xf) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000400)={0xffffffff, {{0x2, 0x4e20, @rand_addr=0x101}}}, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000080)={r3, 0x20, "3f2e1e9567f8966db36b20b99b209843d0a68d220534da0509fdf72ba192e449"}, &(0x7f0000000140)=0x28) 03:41:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf000000) 03:41:14 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000140)=0x60) ioctl$sock_ifreq(0xffffffffffffffff, 0x8923, &(0x7f0000000040)={'ip_vti0\x00', @ifru_flags}) 03:41:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000e600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0xf0dd, 0x14, 0x1, r2}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x1000000) 03:41:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:14 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000340)=""/122, 0x7a}, {&(0x7f0000000100)=""/8, 0x8}, {&(0x7f00000003c0)=""/72, 0x48}, {&(0x7f0000000200)=""/9, 0x9}], 0x4, 0x0) close(r0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0xfff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r1, 0x100000001}, &(0x7f0000000140)=0xc) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8104}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="2000000021e98a7fe43b53615b23c829007f22d63c7204161c8eab1d7cdb82b2b9f3a95e53d8b2d5ff2536e8959d62f91a9af728d384c2d15fe050455108d4dfe60d627847d474619b576c0eae8d25e311b10b3132e4d4ce2229cdc0cf3a029532a21f48373957c6e8ce0649525a85138200d2cc612f6856544aa8aa0b3a094e6a0aa7fc15f186f9d098cbf26ff86b27f04fa81aa0a438f465d2bf3916d1a20dd616f63de8588011131ca29d81337ea22a", @ANYRES16=r2, @ANYBLOB="000625ad7000fcdbdf25020000000c000800001000000000000080c9fbf6d8356898ecbfd809202cb115bf42b8bd7bbc52"], 0x20}, 0x1, 0x0, 0x0, 0x24004800}, 0x4000000) 03:41:15 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) [ 817.524737] validate_nla: 2 callbacks suppressed [ 817.524751] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:15 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000001, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:15 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000000)={0x8001007, 0xfffffffffffffc01, 0x2}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000040)={0x8001, 0xe737, 0x301f, 0x7f, 0xfff, {0x2, 0x7}}) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) syz_open_procfs(r1, &(0x7f0000000180)='oom_score\x00') setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000100)='-vboxnet0*vboxnet1/lo-\x00', 0x17, 0x1) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x6000000000000000) [ 817.916471] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:15 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) 03:41:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) io_setup(0x200, &(0x7f0000000040)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xa000000) 03:41:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000001000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:15 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xc0000000, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) wait4(r1, 0x0, 0x8, &(0x7f0000000040)) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x7}, 0x28, 0x1) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140)=0x6, 0x4) [ 818.064800] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:16 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xffffffffffffff95, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40, 0x0) inotify_init() fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4) 03:41:16 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0x600) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000005c0)={0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}]}) r2 = socket(0x10, 0x3, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x4101, 0x0) r4 = dup(r1) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f0000000680)=0x1) write$P9_RSTATFS(r3, &(0x7f00000000c0)={0x43, 0x9, 0x2, {0x800, 0x2, 0x82, 0x7f, 0x3, 0x7, 0x4, 0xd2f, 0xa1}}, 0x43) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000640)) fallocate(r3, 0x800000000060, 0x0, 0x1000000000) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000600)={0x6, 0x100000001}) ioctl$sock_ifreq(r2, 0x89ee, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:16 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) epoll_create(0xda2) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000040)) epoll_create1(0x0) 03:41:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 818.794568] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:16 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x100000001, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) r1 = gettid() getpgrp(r1) 03:41:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700008400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000b300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:16 executing program 1: r0 = socket(0x1b, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 818.841137] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x100000000000000) 03:41:16 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x40) fsetxattr$security_selinux(r0, &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='/usr/lib/telepathy/mission-control-5\x00', 0x25, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x7, 0x820c, 0x8, 0x3ff, 0x1, 0x7, 0x7ff, 0x0}, &(0x7f0000000080)=0x20) syz_open_pts(r0, 0x240040) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x80, 0x8001, 0x5, 0x1, 0x80000000}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x2, @mcast1, 0x8}, {0xa, 0x4e23, 0x200, @loopback}, r2, 0x4}}, 0x48) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f00000001c0)={0x101, 0x3, @name="8042c92f5327386a12921411b5c467093c91c4d73214f7089aa555e640ce2e04"}) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000180)) ioctl$SG_EMULATED_HOST(r3, 0xc0347c03, &(0x7f0000000100)) [ 819.016469] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000b600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = memfd_create(&(0x7f0000000280)='J\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a45352, &(0x7f0000000100)={{0x1, 0x4}, 'port1\x00', 0x42, 0x10, 0x1000000, 0x10000, 0x5, 0x1, 0x1, 0x0, 0x0, 0xc2ea}) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000040)={'ip_vti0\x00', @ifru_flags}) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000004c0)) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') accept4$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0xfffffffffffffe5c, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="164907941baa", @ANYRES16=r2, @ANYBLOB="040b2abd7000fcdbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="b80002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000008000300030000000800040007000000"], 0xd4}, 0x1, 0x0, 0x0, 0x20000800}, 0x20040005) fanotify_init(0x6, 0x40001) 03:41:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4800000000000000) 03:41:17 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:17 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2002, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000100)) [ 819.720066] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000cc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf0ffffff) 03:41:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:17 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x1) 03:41:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0xfffffffffffffffc, 0x2, 0x4, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:41:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf000) 03:41:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000d100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000de00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:17 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl(r0, 0x9, &(0x7f0000000140)="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") ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) [ 819.997963] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xfffffffffffff000) [ 820.147961] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:18 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) recvmsg(r2, &(0x7f0000000700)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f0000000380)=""/235, 0xeb}, {&(0x7f0000000500)=""/89, 0x59}, {&(0x7f0000000480)=""/62, 0x3e}, {&(0x7f0000000600)=""/8, 0x8}, {&(0x7f00000007c0)=""/130, 0x82}, {&(0x7f00000006c0)=""/48, 0x30}, {&(0x7f0000000900)=""/247, 0xf7}, {&(0x7f0000000a00)=""/252, 0xfc}], 0x9, &(0x7f0000001700)=""/4096, 0x1000, 0xf0}, 0x1) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:18 executing program 1: r0 = socket(0x10, 0x7, 0x3) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x700000000000000) 03:41:18 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) 03:41:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000b300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 820.714187] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:18 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:18 executing program 1: r0 = socket(0x1f, 0x84, 0x4004) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)="2f70726f632f7379732f6e65742f697076342f76732f7305478fad756c655f69636d7000ed0000feeca114d3f300be00000000ad9a1c1213e636b1e1b610cd807e66c46ce06ccfd195cf750f4c76a8f2a80bb03e7957c590279db29ce9747dce8e9e7f1c1ff8a8f15160471571f019b560ddd03d5c2f3eb0a533a68318a5860000000000000000000000000035afcc27cb4800303f7ff653cdae56b3734feef3156514b86adb84272c23d86b48b59e3b50f2e84982304bf3ab573bdba0366d961962cf2dce1c84d35eec6d09f0e1b47c11e67267d6a7a571485244e65533e65f69f1a63919e7e2b2d79b01", 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e23, 0x9, @loopback, 0x81}, {0xa, 0x4e21, 0x5, @empty, 0xffffffffffffff98}, 0x2, [0x7f, 0x4, 0x7ff, 0x10000, 0x5, 0x3, 0x1f, 0x4]}, 0x5c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4002, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0), 0x4) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000100)="3af060899537f9b445f758a530b1bb7f", 0x10) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x500000000000000) 03:41:18 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:var_lock_t:s0\x00', 0x20, 0x3) 03:41:19 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x3, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000140)={0x3, 0x7, 0x0, 0xf9, 'syz0\x00', 0x7f}) r4 = memfd_create(&(0x7f00000000c0)='\x00', 0x5) r5 = openat(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x24) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)=0x4, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2000, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f00000000c0)={0x4, @raw_data="da089b6cad8ef3a0815fc74252b74693d8a94cb9b3cd10b5c2d18462fe235046991e1f61881bfdddebda78222978765a8b5c7af094db5d07b6a968e8332d18ede18492573c32fee5594c51fdb6276bbb189735c8ad43ba09f731c8a08dc7f283e7efca65a825ba697ba84157831efee86bfcf4a5dbc41fad4b001cb3c9105f5e9dd8c9b24bbcf90ea11b0773b24c311a285633c9fc18b9972f4026d94fdd2dbc5023d072e39d788ca74b48eda1e398f1fd3474481bce83b7e98c46eafaba359065c8e1686bed18a9"}) 03:41:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xfffff000) 03:41:19 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000000)) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x40000000) 03:41:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ptrace$setregs(0xd, r1, 0x10001, &(0x7f00000000c0)="850b1e67278d84d23cf218040cf3899f142b0487580bbb3c171d140fe91505a433adcb1d680dde291569768be880e335c6aac2b89f6e2589b5d2427fae8c6c366572d02e456f064dff20b080d612936c9f43b1a176926ed53627cfaca00d85bdb21a61d094f78f0cf6ffeee72aa4394ab71752e7a6ebab5b5778de117ee1a8e4c5c007c2d8d8f81a20dbe841309b8100108250c6789fea380bec516396372aa79e0908314110c7bdf7ce7ac2a040477f3d0e9ea48040e5bb08ab6e8fdd197eae396c52a32f9024e3e227e8230e86b253cd6242659fa2e1a4569637dcaf") ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4008641c, &(0x7f0000000340)={r3, &(0x7f0000000280)=""/148}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:19 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x1, 0x4) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={"69705ff674693000", @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:20 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b5016403596a100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) getsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000180)=""/26, &(0x7f0000000380)=0x1a) fcntl$getflags(0xffffffffffffffff, 0x401) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x200602, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x210800, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f0000000900)}}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x500) 03:41:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000240)=ANY=[], &(0x7f00000012c0)=""/192, 0x0, 0xc0}, 0xfffffffffffffe63) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x2, 0xfff}) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000200)={0xa, {0x102fc, 0xbcec, 0x2, 0x2}}) socketpair(0x1b, 0x4, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000040)={0x1, 0x7, {0x100, 0x8, 0x2, 0x1000}}) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000140)={0x987, 0x7fffffff, 0x301f, 0x6, 0x2, {0x100000000, 0xd13}, 0x1}) ioctl$SG_EMULATED_HOST(r3, 0xc0347c03, &(0x7f0000000100)) 03:41:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:20 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {r1, 0x1, 0x0, 0x0, 0x0, @ib={0x1b, 0x401, 0x1, {"cb04bc27494e94d02a2f49af08f39ece"}, 0x2db, 0x704, 0x24}, @ib={0x1b, 0x7, 0x5, {"6a1d004571f21b3b233d2ffda25e8f57"}, 0x4, 0x1ff, 0x30}}}, 0x118) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x60000) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000000c0)={0x2, 0x4, 0x33be, 0x24, 0x7, 0x100000000, 0x2}) ioctl$VIDIOC_G_FMT(r0, 0xc0cc5604, &(0x7f0000000500)={0x8, @pix={0x4e, 0x6, 0x7d47524f, 0x8, 0x10000, 0x6, 0xf, 0x0, 0x1, 0x8, 0x2}}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000200)={@remote, 0x0}, &(0x7f0000000240)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x12, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x2, 0x6, 0xb, 0x1, 0xb8, 0xfffffffffffffffc}, @alu={0x7, 0x7fff, 0xf, 0x1, 0x7, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x770, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff}, @call={0x85, 0x0, 0x0, 0x4b}, @map={0x18, 0x6, 0x1, 0x0, r3}, @exit, @call={0x85, 0x0, 0x0, 0x51}, @exit], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, [], r4}, 0x48) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 822.736707] validate_nla: 3 callbacks suppressed [ 822.736730] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x2000) 03:41:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x8a000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f00000000c0)={0xa, 0x2, 0x1f, 0x40, 'syz0\x00', 0x8}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000b200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:20 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x25, 0x0) recvmsg(r0, &(0x7f00000048c0)={&(0x7f00000025c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003880)=[{&(0x7f0000002640)=""/121, 0x79}, {&(0x7f00000026c0)=""/180, 0xb4}, {&(0x7f0000002780)=""/60, 0x3c}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/139, 0x8b}], 0x5, &(0x7f00000038c0)=""/4096, 0x1000, 0x6}, 0x20) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000004900)={@dev={0xfe, 0x80, [], 0x12}, @remote, @mcast1, 0xffffffff00000001, 0xfff, 0x800, 0x400, 0x401, 0x10000, r1}) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) socket$inet_smc(0x2b, 0x1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0xe, 0x1}, 0x14) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000040)={0x2, 0x1}) 03:41:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ec00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 822.904963] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:21 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(r1, 0x40b) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0xdf}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000100)=[@enter_looper], 0x1, 0x0, &(0x7f0000000180)='T'}) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1004000000016) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05c7f1508a0000b324e32a672e5308de6d179ff1dc1f1b4000000000"], 0xfffffffffffffced, 0x0, &(0x7f0000000040)}) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 03:41:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf0) 03:41:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:21 executing program 1: socket(0x11, 0x3, 0x6) r0 = socket(0x2, 0x2, 0xfffffffffffffffe) ioctl$sock_ifreq(r0, 0x891a, &(0x7f0000000040)={'lo\x00', @ifru_hwaddr=@dev={[], 0x18}}) ioctl$sock_ifreq(r0, 0x893f, &(0x7f0000000080)={'ip6_vti0\x00', @ifru_mtu=0x1}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e23, @loopback}}, 0x19bf, 0x100000001, 0x8, "bda73f9e17bf83a43488c85e34b7c11e717930b56b32d7db384eec8eb7276f681cb457cf59925994566a309ca9c66f562f7c45be6f51c2c8c6500695ab9ad2a00d0d748f9aeb918b8a0facad089964a3"}, 0xd8) 03:41:21 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x6, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={r1, 0xd8, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0xffff, @loopback, 0x8}, @in6={0xa, 0x4e22, 0x4, @empty, 0x8}, @in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e23, 0x80, @local, 0x40}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e20, 0xc8, @dev={0xfe, 0x80, [], 0x1e}, 0x2800000000000000}, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [], @remote}, 0x1000}, @in={0x2, 0x4e22, @rand_addr=0xffff}]}, &(0x7f0000000240)=0xc) 03:41:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000d700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:21 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x400001) pwrite64(r0, &(0x7f0000000000)="32fad73d31d45961dd3992e79dd0b79c4f8cc0fa56e92cf1d6efb24f74df6c7c06933513bf5c2a5c283cce640477db575a9ad2715f13b494fd06cc217152e6cb", 0x40, 0x0) [ 823.760793] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x6c00) 03:41:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000dd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 823.873011] binder: 15393 RLIMIT_NICE not set 03:41:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) fcntl$setflags(r0, 0x2, 0x1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e20, @rand_addr=0x10000}}, 0x3, 0x7, 0xfffffffffffeffff, "95b800a68c8078c4517694054083841b9158d2b2728afe6b76ca5b7200bb7e46bbc7c5869662218b40428a5dcfbd4a8f5120a6dbd5ada0e3dd180b6767ccf85d24bc2c5eeb63bc6ea45065b515b7d2e6"}, 0xd8) 03:41:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 823.920192] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 823.929462] binder: 15391:15393 unknown command 1358022405 [ 823.954084] binder: 15391:15393 ioctl c0306201 20000000 returned -22 [ 824.562233] binder: 15419 RLIMIT_NICE not set [ 824.577468] binder: 15391:15408 unknown command 1358022405 [ 824.583119] binder: 15391:15408 ioctl c0306201 20000000 returned -22 03:41:22 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:22 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x40000) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x802) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x9) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000100)) connect$l2tp(r1, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x2, 0x1, 0x1, {0xa, 0x4e20, 0xfffffffffffff928, @dev={0xfe, 0x80, [], 0x15}, 0x2}}}, 0x3a) 03:41:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009c00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x6800) 03:41:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x923ff, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009a00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000dc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:22 executing program 1: r0 = socket(0x10, 0x3, 0xfffffffffffffffd) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4083, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000100)=""/161) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f00000000c0)={'ip_vti0\x00', @ifru_hwaddr}) [ 824.746923] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:22 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400002, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000100)) 03:41:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000bd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x5) 03:41:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=@routing={0x2f, 0x4, 0x3, 0x4, 0x0, [@remote, @loopback]}, 0x28) 03:41:23 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="e59bfe1b51f90ad797d9fb047fcf430f", 0x10) fsync(r0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file1\x00') ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ea00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xa) 03:41:23 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[], 0xa) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x2c, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x2, @mcast1}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x20}, 0x8) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000080)={'ip_vti0\x00', @ifru_names='syzkaller0\x00'}) [ 825.680961] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0xfffffffffffffffd, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f00000000c0)={'ip_vti0\x00', @ifru_settings={0x9, 0xe8a, @fr_pvc=&(0x7f0000000040)={0x81}}}) 03:41:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:23 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x200801, 0x0) getgroups(0x6, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) keyctl$chown(0x4, r1, r2, r3) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) 03:41:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xffffff9e) 03:41:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33b) 03:41:23 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4b4c8131, 0xc000) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0xc0347c03, &(0x7f0000000040)) [ 825.884626] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x48) 03:41:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8000, 0x101000) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000180)={0x29400, "69d4c2c8fd64357d3b496709d227e29370f737d4d494d2e67a091a893498dd2b", 0x3, 0x32ab, 0x95, 0x3200e0, 0x4}) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = socket(0x2000001, 0x3, 0x9) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x20) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$sock_ifreq(r1, 0x893e, &(0x7f0000000080)={'teql0\x00', @ifru_flags}) setxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64IPOUT\x00', &(0x7f0000000280)='ip_vti0\x00', 0x8, 0x1) [ 826.086212] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:24 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x200000004e23, @loopback}, 0x199) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socket$netlink(0x10, 0x3, 0x1) 03:41:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:24 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f00000000c0)) 03:41:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x7a) 03:41:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:24 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000000c0)={0xffffffff80000001, 0x800}) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@loopback, @rand_addr=0x8, @multicast1}, 0xc) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000180)=0xffffffffffffff1b) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x288, 0x80200) write$apparmor_current(r1, &(0x7f00000000c0)=@hat={'changehat ', 0x1, 0x5e, ['wlan1.%\x00', 'NETMAP\x00', 'ip_vti0\x00', '^Evboxnet0/#$!!\x00', 'eth1\x00', 'vmnet0trusted(Rproc:^.nodev+@em1c\x00', 'ip_vti0\x00', 'ip_vti0\x00']}, 0x7b) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 826.676816] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:24 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x1, 0xffffffffffffffff) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x3ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x8, 0x2, 0x6, 0x0, r1}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={r2, 0x7, 0x20}, &(0x7f00000001c0)=0xc) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000200)=0x3) 03:41:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x6800000000000000) 03:41:24 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1, 0x2, 0x4, 0x4, 0x2, 0x6, 0x1, 0x3a4, 0x40, 0x167, 0xf7, 0x5, 0x38, 0x1, 0x1, 0x20, 0x4}, [{0x5, 0x6, 0x2, 0x1ff, 0x88, 0x3ebd, 0x100000001, 0x5}, {0x60000000, 0x81, 0x7, 0x80000001, 0x0, 0x101, 0x43, 0x3}], "e3361d2195eee0534df9d51ae7b4adc08d147c03e07c3b2da353692273ae6b738f8e96488018276eb939fa2cca6a050b2f21d32ac3d037461949455cc2bcff842d865adac2061bb63843bce61dd36fd0", [[]]}, 0x200) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000008b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:24 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) [ 826.887232] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xfeff000000000000) 03:41:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008c00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000080)={'bond0\x00', @ifru_flags}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getnetconf={0x14, 0x52, 0x4, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xa8b2eb3be2c19a8a}, 0x4000805) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000240)={r1, 0x80}, 0x8) 03:41:24 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x1c0, 0x620140) r5 = syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x1c00000000, 0x101000) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000400)={r2, 0x1ff, 0x2, r5}) write$UHID_CREATE(r3, &(0x7f0000001080)={0x0, 'syz1\x00', "737978310000000000000000000000000000000200000057310f00000000000000000000000000170000220000000000000000000000000000000000001400", 'syz0\x00', &(0x7f0000000000)=""/11, 0xb, 0x0, 0x0, 0x4}, 0x11c) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000580)) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f0000000040)) ioctl$KVM_INTERRUPT(r6, 0x4004ae86, &(0x7f0000000140)=0x7fff) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r7}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r8, 0x5425, 0x0) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0xa000000000000000, 0x2) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6, 0x0, 0x0, 0x800, 0x0, 0x92}, 0x98) sendto$inet(r1, &(0x7f00000002c0)='F', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 03:41:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r1, @ANYBLOB="0004ccfce700fcdbdf25040000003800010008000900420000000c0007001800000026000000080001000a0000000c00070008000000020000000c00070004000000020000003400010008000b00736970000c000700040000000000000008000900330000000c0007003cd2e89920000000080045000400000008000600b294ffff08000500010000002000030014000200626f6e645f736c6176655f30000000000800030001000000"], 0xb0}, 0x1, 0x0, 0x0, 0x20000010}, 0x40000) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x15f98d38, 0x200000) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000000c0)) 03:41:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x7a00000000000000) [ 827.163076] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 827.185547] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 03:41:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 827.222539] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 03:41:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 827.265623] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 03:41:25 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000001480)={'bridge_slave_0\x00', 0x28000000000}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"69705f760000000000e3de00", @ifru_flags}) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3f, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000001300)=[{&(0x7f00000001c0)=""/28, 0x1c}, {&(0x7f0000000200)=""/244, 0xf4}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3, &(0x7f0000001340)=""/245, 0xf5}, 0x100) timer_create(0x3, &(0x7f00000034c0)={0x0, 0x3, 0x7, @thr={&(0x7f00000014c0)="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", &(0x7f00000024c0)="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"}}, &(0x7f0000003500)=0x0) timer_settime(r1, 0x0, &(0x7f0000003540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000003580)) [ 827.309632] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 827.343394] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 03:41:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf0ffff) 03:41:25 executing program 5: r0 = socket(0x1e, 0x1, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) [ 827.376666] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 03:41:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 827.420216] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 827.454645] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 03:41:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 827.491292] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 827.512213] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 03:41:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xf00) [ 827.536247] hid-generic 0000:0000:0004.0002: hidraw0: HID v0.00 Device [syz1] on syx1 03:41:26 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) recvfrom$inet(r3, &(0x7f00000000c0)=""/247, 0xf7, 0x1, &(0x7f0000000380)={0x2, 0x4e21, @loopback}, 0x10) 03:41:26 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {0x1, 0x0, 0x1, 0x1, 0x5, 0x8}, {0x0, 0x8, 0x0, 0xe39}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@remote}, 0x0, @in6=@mcast2, 0x3503, 0x0, 0x0, 0x5}}, 0xe8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000440)={{0xa, 0x4e20, 0x0, @ipv4={[], [], @rand_addr}}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x0, [0x0, 0x0, 0x0, 0x1]}, 0x5c) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f0000004080)=[{{&(0x7f0000000500)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f0000000680)=""/255, 0xff}], 0x2, &(0x7f0000000780)=""/167, 0xa7, 0xd423}, 0x327a}, {{&(0x7f0000000e00)=@vsock, 0x80, &(0x7f0000002400)=[{&(0x7f0000000f40)=""/69, 0x45}, {&(0x7f0000000840)=""/32, 0x20}, {&(0x7f0000002300)=""/224, 0xe0}, {&(0x7f0000001040)=""/175, 0xaf}], 0x4, &(0x7f0000002480)=""/111, 0x6f, 0x5}}], 0x2, 0x40, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') prctl$setmm(0x23, 0x7, &(0x7f0000ffe000/0x2000)=nil) umount2(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7}, 0x7) close(0xffffffffffffffff) 03:41:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4800) 03:41:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xe18e) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f00000000c0)={"783b414b7f0800", @ifru_flags}) [ 828.424039] validate_nla: 4 callbacks suppressed [ 828.424049] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:26 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x800000000000a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000140)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x1, &(0x7f0000000000)=[0x0]}}}) clone(0x0, &(0x7f0000000340), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0145401, &(0x7f0000000000)) 03:41:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700008c00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xd101000000000000) 03:41:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x72c, 0x2}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x4, 0x1}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x3ff}, &(0x7f0000000140)=0x8) 03:41:26 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0xb) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:41:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) socket$inet_sctp(0x2, 0x5, 0x84) [ 828.658659] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xff0f000000000000) 03:41:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000fb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000d100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x100, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x34, 0x0, &(0x7f0000000380)=[@exit_looper, @request_death={0x400c630e, 0x4}, @request_death, @clear_death={0x400c630f, 0x1}], 0x76, 0x0, &(0x7f00000003c0)="d95ec88330f015b8e5cf9063f3a06692ea853f01c32d8eaf693eb116e06e215370fb3e301bca7c22f1157c73200b5516969fa701cbeb1a121692cb57c12a54b8f076605f9d3ece29538d73a5c862670a2857aa36dc39cdca2b2c54c9fb8ec1371960b569126d004d0845bd94b12769fb791f73695a83"}) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4004240b, &(0x7f0000000100)={0x4, 0x70, 0xdc14, 0x3ff, 0x6, 0x200, 0x0, 0x7, 0x1, 0x4, 0x24f0000, 0xffffffffffffff01, 0x5, 0x2, 0x44d8, 0x100000000, 0x10001, 0x1, 0x4, 0x8, 0x80000001, 0x3, 0x2, 0xf0e, 0x2b5, 0x7ff, 0x4, 0x1f, 0x1, 0x8, 0x4cf, 0x81, 0x4, 0xb7a, 0x9, 0xd7, 0x5, 0x1000, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x2, 0x8001, 0x0, 0x7, 0x0, 0x3, 0xa79}) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 828.822692] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a", 0x58}], 0x1) 03:41:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x8100000000000000) 03:41:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009d00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000de00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000140)={0x0, {0x1, 0x7fffffff, 0x5, 0x6, 0x0, 0x9}}) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000380), 0x0, 0x200007fd, &(0x7f0000000180)={0x2, 0x4e23}, 0xfffffffffffffdec) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$notify(r0, 0x402, 0x12) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f00000000c0)=0x100000000, 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000100)={'eql\x00', @ifru_mtu=0x8}) [ 829.029508] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000d200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x10000000) 03:41:27 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="12"], 0x1) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000340), 0x0) r3 = accept4(r2, 0x0, &(0x7f0000000200)=0x350, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 03:41:27 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x0) getitimer(0x0, &(0x7f0000000000)={{0x0}}) r1 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'team_slave_0\x00', {0x2, 0x4e21, @local}}) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESOCT=0x0, @ANYRESOCT, @ANYRESOCT=r0, @ANYRESHEX=0x0, @ANYRES64=r4, @ANYRES32=0x0], @ANYRES32, @ANYRES16], 0xe) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:27 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x4c7d, 0x7, 0x3, 0x73ae, 0xffffffff80000001, 0x6, 0x3, 0x4d73, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x401}, &(0x7f0000000180)=0x8) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89ff, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r3, 0x89f2, &(0x7f0000000200)={'ip_vti0\x00', @ifru_flags}) 03:41:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 829.317694] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000008100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:27 executing program 5: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(r1, 0x40b) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0xdf}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000100)=[@enter_looper], 0x1, 0x0, &(0x7f0000000180)='T'}) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1004000000016) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05c7f1508a0000b324e32a672e5308de6d179ff1dc1f1b4000000000"], 0xfffffffffffffced, 0x0, &(0x7f0000000040)}) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 03:41:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x1d1) 03:41:27 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[], 0x0, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc, 0x85013, r1, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x4000000000000) [ 829.650368] binder: 15729 RLIMIT_NICE not set 03:41:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f6, &(0x7f00000000c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000040)="e519b8ab738021eb82ef56f0c90c4927ad1c00b773aaf258ded338a51c5e6d4f"}) [ 829.691506] binder: 15728:15729 unknown command 1358022405 [ 829.693143] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 829.705825] binder: 15728:15729 ioctl c0306201 20000000 returned -22 03:41:27 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @local}, &(0x7f0000000140)=0xc) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ustat(0x81, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x2000000) 03:41:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 829.882403] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:28 executing program 5: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(r1, 0x40b) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0xdf}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000100)=[@enter_looper], 0x1, 0x0, &(0x7f0000000180)='T'}) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1004000000016) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05c7f1508a0000b324e32a672e5308de6d179ff1dc1f1b4000000000"], 0xfffffffffffffced, 0x0, &(0x7f0000000040)}) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 03:41:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x9, 0x4) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x6c000000) 03:41:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000aa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:28 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000006, 0x8000007ffffffff) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 830.394227] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:28 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x440040, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0), 0x4) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 830.440699] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:28 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac3188d2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x74000000) [ 830.530899] binder: 15784 RLIMIT_NICE not set 03:41:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 830.603503] binder: 15783:15784 unknown command 1358022405 03:41:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x400008929, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 830.647804] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 830.661113] binder: 15783:15784 ioctl c0306201 20000000 returned -22 03:41:29 executing program 5: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) recvmsg(r2, &(0x7f0000000700)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f0000000380)=""/235, 0xeb}, {&(0x7f0000000500)=""/89, 0x59}, {&(0x7f0000000480)=""/62, 0x3e}, {&(0x7f0000000600)=""/8, 0x8}, {&(0x7f00000007c0)=""/130, 0x82}, {&(0x7f00000006c0)=""/48, 0x30}, {&(0x7f0000000900)=""/247, 0xf7}, {&(0x7f0000000a00)=""/252, 0xfc}], 0x9, &(0x7f0000001700)=""/4096, 0x1000, 0xf0}, 0x1) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0xa00) 03:41:29 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x2000003, 0x9) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r4, 0xaeb7) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r6 = openat(r5, &(0x7f0000000000)='./file0\x00', 0x40800, 0x103) getsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000500)=0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) ioctl$EVIOCSKEYCODE_V2(r6, 0x40284504, &(0x7f00000005c0)={0x6, 0xd, 0x4, 0x20, "929299a69c4b18518ac019f4aebe94ca6e7b2cd19e5df9779caa989c69f5a132"}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100)=0x293, 0x0) sendto$unix(r7, &(0x7f00000002c0)='`', 0x1, 0x44040, 0x0, 0x0) recvmsg$kcm(r7, &(0x7f0000000140)={&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/177, 0xffffffffffffff8e}], 0x1}, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x400caeaa, &(0x7f0000000080)) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r7, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000740)={&(0x7f0000000e00)=ANY=[@ANYBLOB="b38934e2342909803abddfd463921f9a79dfb3d2f49d4b7f7d398ffd149a4c31de285a2e2a62d55c546d6e1dd48e63d321a5ec15c4ce", @ANYRES16=r8, @ANYBLOB="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"], 0x6c}}, 0x2004c841) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000540)=0x1, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000006c0)={0x0, 0x4, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x0, 0x0, 0x6500}) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$P9_RWSTAT(r6, &(0x7f0000000580)={0xffffffffffffff0d, 0x7f, 0x2}, 0xffffffffffffff89) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) 03:41:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x379, 0x20200) io_setup(0x9, &(0x7f0000000040)=0x0) io_getevents(r2, 0x2, 0x2, &(0x7f0000000240)=[{}, {}], &(0x7f0000000280)={0x0, 0x1c9c380}) ioctl$VIDIOC_S_FBUF(r1, 0x402c560b, &(0x7f00000001c0)={0x8, 0x0, &(0x7f00000000c0)="ed3b559b4ec10bb20796ab950b10bda2c1343ffdd156ef98dcd48c95a665babad3f8fe75e17a7559cb85dbe30f00aed18ab839fa9055a28a2ce889b67d3d0aa68e897d65b78ed4639b4040aeb2fd46df226a7a9ba088c824ccdae3f0ec43badcbe813b751f933d0fc7ba554a0131948a2db3035b74e4e5f40a22cf2e6452742310323bb1eeafdba874ac6a498f3032f17bb2b3e906b84dffad1352deec9db57d95d03afc9183d5f20e2b09b0aa43c65fc91e9ffd2338b79ff7ec1d16859023833fc334eae2098c726635c3a3ff2339eedd67e5ebbce92787d2ec6566", {0xc73000000000000, 0xac5, 0x43353039, 0xf, 0x4, 0xd7b, 0xf, 0xec}}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x893d, &(0x7f00000002c0)={'bcsf0\x00', @ifru_data=&(0x7f0000000300)="7b8ae36f605adba17c30d048aa8e64fe06d37e14af30e5962439bd69adc93962"}) 03:41:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ea00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000bf00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000c0c186366645b4e890f8a0939b424ee5d1affbc9e7333d6b7c6901ea067e8046b496a194585dad869189df4cf6246a486e2b1f4763e7d69af826e65c2618c8ac33a4eb6330045592ae3457487e5ed464750635447cb3a92e7d2c2348e24e3050d060cc4a0b1585b959c1de6c3dc3142288f9675dbeb3c238e8a51a3b"], 0x40}}, 0x0) 03:41:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000bd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) unshare(0x40020000) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x18d280, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) 03:41:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\b\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 831.813810] IPVS: ftp: loaded support on port[0] = 21 [ 831.922419] IPVS: ftp: loaded support on port[0] = 21 03:41:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) pwrite64(r0, &(0x7f0000000000)="949686aa79cad7c53cb3b1c9a6da668ef20dc5424703c7f86b481cf75b9622fa68b73f62e2ec52f8f54cd6c054a673239714abaa14574a432a7c6e3ea34217047e2ec1a88c3ab2838a7501f2fbf30a825cfad0c3e4ec9dcf281c57b50f6f63376c9fe9283c", 0x65, 0x0) fchdir(r0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff0000e0bc3600b037aad19ecb", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) 03:41:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700008700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:29 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x3}}, 0x18) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r4}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r5, 0x80345631, &(0x7f0000000500)) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:29 executing program 5: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = openat(r3, &(0x7f0000000140)='./file0/file0\x00', 0xa0400, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00') write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x80, r5, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x82}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x18a}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x28}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x4004) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000040)=0xc8fd) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4013000010001fff0000050000000000fc880403000000d7f08c71b8bf7100000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000012069884f65000800020030000000"], 0x40}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000000c0)={0x8001, 0x1, 0x533f, 0x3, 0x101, 0x3}) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180)) 03:41:30 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x9e, 0x2, 0x1, "03b1696f818c504c615553aa9736b374", "28651d5cc0e7d10d4f3b530524122a3d8eada07b15d10a22a978643919a11b1b69d202bfb96557081923df895c502f24e31a800a6a4d63b2ea550ef589ce8f0756686a9ab3c8d5e647d72c411e8988f21d1df46165a61fc586ee01b201d189556d40099b319173ee066854d02d39a0df052129c0c3d1116b82eb89944b9624a2aff0e1be4c6c1e4adb"}, 0x9e, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ca00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:30 executing program 1: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) 03:41:30 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0x1015, 0x6, 0x1, "ed2620ca6fd23a7920e20783da9078d1", "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"}, 0x1015, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\f\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 832.631132] __nla_parse: 5 callbacks suppressed [ 832.631143] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:30 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000040)='net/rt_cache\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, &(0x7f0000000100)=0xd6, 0x27000000) 03:41:30 executing program 1: r0 = socket(0x4, 0xf, 0x80000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x20000000, &(0x7f0000000100)={'team0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x80) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x300003}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, r3, 0x202, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1ac11bf6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffffffff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x8c}}, 0x4000) ioctl$VIDIOC_ENUMSTD(r1, 0xc0405619, &(0x7f00000000c0)={0x0, 0x100, "69bacc1c7e66584c0a31401836fd73987670beeec0c7a8eb", {0xffffffff, 0xffffffffffff8001}, 0x5}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) fadvise64(r2, 0x0, 0xdd9, 0x4) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000400000003000000000000003567772c0000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000900000000000000d1390000000000004400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d83ab28b3085d0c0eb9beac728937b4831eb6c91e74868adc0b9cb3bd07e16c9eb4c41c3e7c6435100000000"]) 03:41:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x80, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x3}, 0xfffffffffffffd71, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="40aab3be2def3100000010001ffd000000000000", @ANYPTR, @ANYBLOB="00000000000000002000ea01001000010069000000000c0002000800296752fe55556de60893fdf226023f810200300000"], 0x40}}, 0x0) userfaultfd(0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x74, 0x0, [0x64, 0xa9, 0xfffffffffffffffa, 0xff]}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000004c0)={0x8, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @multicast1}, 0x1, 0xff, 0xb6c2, 0x39, 0x40, &(0x7f0000000480)='veth0\x00', 0x40, 0x4, 0x3}) ioprio_get$uid(0x3, r4) getsockopt$sock_int(r3, 0x1, 0x3f, &(0x7f0000000540), &(0x7f0000000580)=0x4) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x94, 0x2}) 03:41:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000c400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:30 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r2, 0x1, 0xc, &(0x7f0000000100)=0xaba, 0xfffffffffffffdcf) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:31 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20c40, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @local}}, 0x8001, 0x5, 0x8, 0x0, 0x20}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x8000, 0x6, 0x1000, r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x4, 0xffffffffffffff80, 0x8000, 0x7, 0x5, 0xef, 0x7, 0xfffffffffffffff8, r1}, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000040)={'bcsf0\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xb549228b01840d6b}}) 03:41:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f00000011c0)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c00020008000200300000001bb29f935b202d670d793ddf869f02ba0fa1c23b07ca7debc534db6bb7517705cfd172fd02961328227939bd97a9b1295fdb68a3ec2425e606bb0e958da6f73d91fd4ed3ddbcf5c9a5a0f0d7d6b563a27b73f5cf85a846cd44e63781205f83975d982ae4282df4a9bc29cad9fcd71e86f7cabc"], 0x40}}, 0x0) r1 = dup(r0) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000016c0)=ANY=[@ANYBLOB="5c0200001a0000022cbd7000ffdbdf250100000040007e0014003100000000000000000000000000000000000c005100070000000000000014008400215e6d643573756d766d6e6574302d0008005600", @ANYRES32=r0, @ANYBLOB="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"], 0x25c}, 0x1, 0x0, 0x0, 0x404c055}, 0xc4) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000001c0)=""/4096, &(0x7f0000000000)=0x1000) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') ioctl$NBD_DO_IT(r2, 0xab03) 03:41:31 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000100)={0x0, 0x7f, 0x7ff, &(0x7f00000000c0)=0x8}) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000e800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000b700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:31 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000300)=0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0}, &(0x7f0000000280)=0x8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x5, &(0x7f0000000180)='syz1\x00'}, 0x30) prlimit64(r4, 0xe, &(0x7f00000002c0)={0xfe0, 0x1}, &(0x7f0000000340)) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) socket$unix(0x1, 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000000c0)={r3, 0x2}, 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x71000}], 0x200000000000000f, 0x0) [ 833.447887] validate_nla: 5 callbacks suppressed [ 833.447898] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x781a1a21fca65e9c, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000000c0)) [ 833.489885] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:31 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000380)="34a191b51c2699a6d442c51dacf5d54f4070c672d79465f071c25d89e6d4194f6de7daed09c1eeef201b7dd00f81262f9317150ed40ab33a159c13af7b0880e390af36d3e4349e2ce6f01d1707f3bea5b9777bae93c18340b2bd0aa10d794e557e4cd8cc84b6bc53218d2b13b85c4b98720016bbe376d2b50c25fa62f8440061508f70ed1c588c54c412282335be13efa0145e85b386620b11f158ffd6cf978b4e462539a6ce832080a9f6a658064c1a7bb878e6388eb7e674ef88a7317f71c759dc2fd871", 0xc5, 0x200007fe, &(0x7f0000000480)={0x2, 0x4000000004e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000040)={'ip_vti0\x00', @ifru_hwaddr}) 03:41:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000cb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xffffffffffffffb8, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:31 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x44001, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000380)="440f20c0350d000000440f22c0f3a60f08263e26360f0051bcc4c18a53e366baf80cb8437c9b84ef66bafc0cec802bf8b9800000c00f3235001000000f30b8010000000f01d9b9800000c00f3235000800000f30", 0x54}], 0x1, 0x4f, &(0x7f0000000400), 0x0) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) fadvise64(r3, 0x0, 0x80000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r4}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = socket(0x10, 0x4, 0x8) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f00000000c0), 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000480)=0x9) ioctl$TCSBRKP(r6, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000440)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x2, 0xd967}, {0x100, 0x4, 0x0, 0x9}]}, 0x8) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000100)) r5 = syz_open_pts(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f0000000240)) dup2(r4, r5) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:32 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000300)=0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0}, &(0x7f0000000280)=0x8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x5, &(0x7f0000000180)='syz1\x00'}, 0x30) prlimit64(r4, 0xe, &(0x7f00000002c0)={0xfe0, 0x1}, &(0x7f0000000340)) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) socket$unix(0x1, 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000000c0)={r3, 0x2}, 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x71000}], 0x200000000000000f, 0x0) 03:41:32 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x4}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000006c0)={r1, 0x6, 0x0, 0x200, 0x4}, &(0x7f0000000700)=0x18) r2 = socket$packet(0x11, 0x400000000000007, 0x300) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x10) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000440)=0x43) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x2, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000380)={0x7, 0x4d, 0x1}, 0x7) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r5, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r5, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f0000000100)) ioctl$VIDIOC_G_STD(r4, 0x80085617, &(0x7f00000007c0)=0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$VIDIOC_S_STD(r6, 0x40085618, &(0x7f0000000140)=r7) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={"62726964656530000000000000002eca", r8}) fsetxattr$trusted_overlay_opaque(r5, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000040), 0x4) r9 = openat(r6, &(0x7f0000000080)='./file0\x00', 0x5, 0x200000000000000) ioctl$TCSBRKP(r9, 0x5425, 0x0) write$binfmt_elf64(r5, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socket(0x4cb8611d477c80f0, 0x5, 0x0) 03:41:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x440041, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0xffff, 0x4) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000000c0)=0x8) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000180)={0x1, 0x9, {0x4, 0x0, 0x301a, 0x7, 0x0, 0x0, 0x2}}) signalfd4(r0, &(0x7f0000000000)={0x4}, 0x8, 0x800) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0010001f6343c218bc1a6eb79a94f9ff00f2ffffff00000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069daf07bd798d582ca8e5c3009caf3703665727370616e0000000c00020008000200300000000d5f4036c8dfc8457dc0770289307ba961683296ce598b40431096a4f505ea12a346743828c3a440ec38f9ea33cd7cac0caa8b51a5"], 0x40}}, 0x0) 03:41:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x35f5930b}]}, 0x14, 0x3) 03:41:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000100)={'bcsf0\x00', @ifru_flags}) 03:41:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f00000000c0), 0xffffffffffffff28, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x101, 0x402401) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x3, 0x55, 0x3}) [ 834.556797] QAT: Invalid ioctl [ 834.566445] QAT: Invalid ioctl 03:41:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:32 executing program 2: getitimer(0x0, &(0x7f0000000000)={{0x0}}) r1 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r4, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESOCT=r0, @ANYRES16], 0x1d) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000d200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:33 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000300)=0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0}, &(0x7f0000000280)=0x8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x5, &(0x7f0000000180)='syz1\x00'}, 0x30) prlimit64(r4, 0xe, &(0x7f00000002c0)={0xfe0, 0x1}, &(0x7f0000000340)) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) socket$unix(0x1, 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000000c0)={r3, 0x2}, 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x71000}], 0x200000000000000f, 0x0) 03:41:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) getpgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0xde, "735c0044e73155359c7b21b72a41b50cd287001e4922253c2f5ce11a5addaffeccd43bae2b86d3a70bc98ed6c9669800d6ffad953964d8c67c5282b4e3ab1605ed0089d05536d0181bb06b6e4bf2c12202ff560ca438228cb054fbddbd84299a6cfac9f54445fa77c17bed5a6b18679e505b6d0a842de8c129275967956d4647ddd7acbd59ab6608ecc1eb9ddd3e0188defc3b12c40b391c3b1f14e3bd1a58c57798b852aac0b1282078c7df914d00ecaeb1ba3a6746113f72d33969d0eab1e7fd00ede31093e0751d122f3f82b0ad36d439d33dead8df493e18f4422792"}, &(0x7f00000001c0)=0xe6) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x5}}, 0x100, 0x3, 0x2, 0x5, 0x40}, 0x98) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000e00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:33 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r1, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000900)=0xd, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) sendto$inet(r1, &(0x7f0000000100)="fb86ebcc1c7650db8e359a1117d3592c52bbc6b2899443fdd67ced8938c4287b30aa76eb98f892f2abb6b849a0c5326988df29d598c69b0f2982238f98", 0x3d, 0x1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) sendmsg$rds(r3, &(0x7f0000000540)={&(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000180)=""/1, 0x1}, {&(0x7f0000000380)=""/248, 0xf8}, {&(0x7f0000000480)=""/18, 0x12}, {&(0x7f00000007c0)=""/191, 0xbf}], 0x4, 0x0, 0x0, 0x4}, 0x4008000) bind$xdp(r3, &(0x7f00000000c0)={0x2c, 0x0, r2, 0x37, r3}, 0x10) 03:41:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000e700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 835.391133] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@dev, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:33 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x800, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000380)={&(0x7f0000000100)=""/160, 0x110000, 0x800, 0x7}, 0x18) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120010ea000069703665727370616e02000000000200080002003000000029e514fc1fd9b3d360d881cb9d9f4e9bb71965b706b81b898f6dfad3d6d6e58dea5aacb745bcadb1010025f906a980108f8522a469a36348a31646cd90cbfd92c54724c16d7b9fb280c934714a959d2142dc96c10dd7f4ed2a4106161b21ff6f"], 0x40}}, 0x0) 03:41:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x105000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000140)={0x48, 0xc, [0x7, 0x7fffffff, 0xffffffff]}) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0xe0, 0x6, 0x44, "6eda16f0ef74a7c35275367e85a1709d", "a7bac2c71ad72fb645943d06cef1e964528ce3ac022d08155e27864d75604ae38bf9bb8db00ddc1b96dc597b107f714ac474e4fadbf4dad36fdca9f7ba47b518e3fd5cd5e31e97d570e1f0b077593219b4eefca393d2b4a874321f24da7c2ec8d40f84d6025868ecffd1da153ca5f50bcbe7d5199f30d8c707853504ac8c42d3460fd0df61139fa2c29f33650ff3ad93f29e64d51b1297cd0fc5b370376124089f40a6b2090de35ef673c7a675e794a429558bd0077196c8b18d19a15b0c85ffc24e3c5b95e04c714b42ca"}, 0xe0, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 835.632208] netlink: 28 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x105000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000140)={0x48, 0xc, [0x7, 0x7fffffff, 0xffffffff]}) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0xe0, 0x6, 0x44, "6eda16f0ef74a7c35275367e85a1709d", "a7bac2c71ad72fb645943d06cef1e964528ce3ac022d08155e27864d75604ae38bf9bb8db00ddc1b96dc597b107f714ac474e4fadbf4dad36fdca9f7ba47b518e3fd5cd5e31e97d570e1f0b077593219b4eefca393d2b4a874321f24da7c2ec8d40f84d6025868ecffd1da153ca5f50bcbe7d5199f30d8c707853504ac8c42d3460fd0df61139fa2c29f33650ff3ad93f29e64d51b1297cd0fc5b370376124089f40a6b2090de35ef673c7a675e794a429558bd0077196c8b18d19a15b0c85ffc24e3c5b95e04c714b42ca"}, 0xe0, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x40}}, 0x0) fallocate(r0, 0x0, 0x100000000, 0x19d605b2) 03:41:34 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ptrace$pokeuser(0x6, r4, 0x78, 0x10001) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000e300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000000c0)=""/159) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'bond_slave_0\x00', @ifru_names='veth0\x00'}) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x80000, 0x0) 03:41:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000fa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0xffffffff) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x9b) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000018, 0x0) [ 836.316764] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 836.369861] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:34 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0xfff, 0x4) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="3d000063f140fb3a066723000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) 03:41:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x104) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000300)={{0x7f, @broadcast, 0x4e21, 0x3, 'lc\x00', 0x10, 0x4, 0x1f}, {@local, 0x4e24, 0x1, 0x0, 0x4}}, 0x44) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4018641b, &(0x7f00000000c0)={0x0, 0x2, 0x2, 0x8, &(0x7f0000ffb000/0x2000)=nil, 0x1}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x2, 0x18, 0x8, 0xb, 0x30, 0x0, 0x70bd2c, 0x25dfdbfd, [@sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e22, 0x3f, @dev={0xfe, 0x80, [], 0xc}, 0xc33}, @in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x16}, 0x1}}, @sadb_ident={0x2, 0xb, 0x8, 0x0, 0x8001}, @sadb_x_policy={0x8, 0x12, 0x1, 0x0, 0x0, 0x6e6bb0, 0x8, {0x6, 0xff, 0x10001, 0xffffffff, 0x0, 0x0, 0x0, @in, @in6=@remote}}, @sadb_x_filter={0x5, 0x1a, @in6=@dev={0xfe, 0x80, [], 0x12}, @in=@broadcast, 0x3, 0x10, 0x14}, @sadb_x_sa2={0x2, 0x13, 0x2, 0x0, 0x0, 0x70bd2b, 0x3506}, @sadb_x_policy={0x8, 0x12, 0x3, 0x0, 0x0, 0x6e6bbc, 0xfffffffffffffbff, {0x6, 0xff, 0x80000001, 0x7, 0x0, 0x49d, 0x0, @in=@multicast2, @in6=@remote}}, @sadb_ident={0x2, 0xb, 0x2, 0x0, 0x5}, @sadb_x_filter={0x5, 0x1a, @in6, @in=@broadcast, 0x7, 0x4, 0x10}, @sadb_x_filter={0x5, 0x1a, @in6=@loopback, @in=@multicast1, 0x7, 0x10, 0x14}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e22}]}, 0x180}}, 0x20000000) 03:41:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200000, 0x28) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/55) 03:41:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000380)=0x200000000) signalfd4(r0, &(0x7f0000000180)={0x1}, 0x8, 0x80000) pread64(r0, &(0x7f0000000100)=""/125, 0x7d, 0x0) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x80, 0x8000) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) sched_setaffinity(r1, 0x8, &(0x7f0000000080)) ptrace$peek(0x1, r1, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101, 0x0) tkill(r1, 0x1000000000016) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x4) fcntl$setstatus(r2, 0x4, 0x4000) 03:41:34 executing program 1: r0 = socket(0x10, 0x3, 0x2000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:34 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@md5={0x1, "239998f38201c16a85c2eb862f8e79c2"}, 0x11, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x6) fsetxattr$security_evm(r3, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "0ff928cafa4b1a21fb02ca1f60b93a46"}, 0x11, 0x1) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) write$P9_RCLUNK(r3, &(0x7f0000000140)={0x7, 0x79, 0x2}, 0x7) [ 836.698001] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 836.748872] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000200)={{0x0, 0x7, 0x5, 0x7, '\x00', 0x6}, 0x4, 0x204, 0xfc2f, r2, 0x3, 0x4, 'syz1\x00', &(0x7f00000001c0)=['selinux', 'trustedeth1nodev\x00', 'selinux'], 0x1f, [], [0x7, 0x7f, 0x9c61, 0x3]}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20440, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23}, 0x3, 0x1, 0x3, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)="2dd18906407d293e4b3be8a2f14e23fcebbdc6cbce2edb7cbe8adcd3b84103e942e5eb20cec2ba50667ec1d55ba34685272422541aa40d908e3378da651db632702651ecb47872c008864797bdfabaf639023f8bfa68a001f86f1d977cd01be5ef22b2f3a4d2ac82f09fa4d37f72452622c2769b593c504b383e4d86982692d9a3e9d363ff45971b3a0ef32f61766579d3f75d938fded9aac9a033232c19b48b84bf514777c94fe288", 0xa9}, {&(0x7f0000000480)}], 0x2, &(0x7f0000000500)=[{0xb4, 0x29, 0x8, "32a722b20693010f3e66f7c8b0567d265f61f9ed62342319e2eaf57a3d17ec278a16aff05f0d92597fc06fe7dcaf593335398099262ed8cfb9f884450f249e16524715803cfca876415374dc838f2b97d6b78176c08313c76b8cb1a63ecf7ec60a64b451ce1539cf15140021a5ca22aa641f481de700e3816004420bd8afc84025a1d5f4ef1640d26217a71b8f7f59bfe3a32cace77fb9244b4d835acaccc7f696617b2519d6"}, {0xa0, 0x103, 0x8, "8bc1ad11ab0e4aa9a4479b359344cf7a5c7a60a4fba5b6320c37727b163706a5c34a090e30bcc0d409e7fc282459b20273ce25ba3b3fb954422eefe1ac9f101c46294065b9f9cec7e1aa8458fcf7a3474c299f9d2844dc3b6407fa46e34f702475b3074db814bb35754fa5558113e4c194d54ead3a75068d5a17af02bfcd7c65e7af8b747b504c5d569e64a77253ded8d512f7d9"}, {0x14, 0x13d, 0xb3, "0d30ce268e3fe0ee"}, {0x88, 0x10e, 0x3, "236776bf911c41de021aa4253a88f3ea16215cd12d10c9db91fec86d02a4deee573c99456a3d4fd27461c24930bb7616651936dd36ff0ef2dc08ae8727974ed3db28e7f5d453c4d8f30a13317e036d733cd2edea99df027e0b8953169d81c9ed1234eb8a32bc0455fe20e0da3c35ff9eec3c5a305ac795ba44"}, {0x3c, 0x10f, 0x9, "39e8dc9ccb730afa15bc7735faaf8e456e7adb14401114b647d8e18914b4b6035d78fccea42637ecce731d9a89025e26"}, {0xb4, 0x10f, 0x9, "95d85f230954c6aafffba2c97e0eb0db7f61517443929da6262e88e3aea19504d8e216efab1f3ba3c160deb9ed52b6fd83e6fd6e4c79f4acfd6a8c8202529c0e3f0c8c860890444544020dec8d21359c3d4a61b50c5959ca2aa4bbd52be7017c70a11c4115ed7834c53301ee9ccb0dc726f591c9b04d74718bb40a5eb0f872bedc5b895113839d1e74de65089e57d1e7a39474a67b919357ba1578e6d0d282ad0ce702ebbb85cc"}, {0xa0, 0x29, 0x7f, "efcc3d94b31e3f4682b0302516dfbe9e72d8755714130479d7236fcbf207963e92b493b3a964c2096b753bd64e382682a278beaae8a9ccd2c2c7f2e72c32b9fb5239f0bdcb4800a19891c918d3cd953ad0a194cda6c5630766c23249a7b2b07cd588476206c81dcd215c04bec7051dad503220e2a2baec506fed9ca8705ce583676eeca3c383f0eb007ce1312ef2618ae144519b"}, {0x80, 0x19f, 0x3, "05da1a51ba260227c3f754fa6475d9d6bfb2da2f30517b345ed30e06c4b368cc5109d72bda042680fee85c42e93031a3ac56eb045567be2840e46a9b6a3fdba040ca677e2409177b395d632691e85994adfbdf5000d9bae8a409dd1513b49616ca6924f0173daabf066ad9ff2d1c0f0814e08876"}, {0x74, 0x11e, 0x6, "341dc18ba16f7143a61bef8c13e6796ca6b378f3886fe3af132026111b817a3cb672fce2704391e0f9601d432d0e3d46bbec29dbddcd9067040f28c69598374f113cfa5aca4a3580bc9af8e1b5be64e32e79d317e3ded43ab87693631bca0e3523b3cfa29748cf26"}], 0x474, 0x8040}, 0x84}, {{&(0x7f0000000980)=@ethernet={0x306}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000a00)="75d5b2ffc019bea3abe4b2bb35cec674017ce3d0c8d7dda72448c83df6127ffdee3abeded1e67f0c41e9feb1e3ef0c8db1e891182dbb2304e4e6cb8f6324dda017e26d06a703cc684d70f0a3fa8321e542d7530b463fb4b883be1832ea4124bf52b6b57be8da375945261f2b012dcbdbfe6b138de34a72e6fbfca2af7a918094c9eae727369805678b9eede8f48487a8fc27943fc7432a4aaf63328e780cc360c9f0d9584165", 0xa6}, {&(0x7f0000000ac0)="28fcd60646dd6c60", 0x8}, {&(0x7f0000000b00)="ab5bb18df50d106ba3f064fb32ab8c0ef2a747c3ae9a9e0aef4b6215b5d27e3a15288853d98a9649710d48f0", 0x2c}, {&(0x7f0000000b40)="1eb42272dff835dbda75f6def086916a8a30fb5876206522d19d3603498b536d828d6d49506b202a9d458a369faedc97e54867cc6f1f806cf91e3c96e34223d9e88e90ddfb54747be82098cd6c4e5d275a864142658fa857eb55a672fc78b265724a5bad848ec62a1c2a4d3dfe5189bca81eb5d551f7ff51f8bf6f89fbff93917a0d6d02ab0c7d238d0bc100d6", 0x8d}, {&(0x7f0000000c00)="06f71c390a684bead393cd7ed4b3294618b364485a423ee6d2e01d3dd67fcd404ee55ed9ead126092dc395c452107a4b9e57427c87add5f41ae80cbabf4019f0b2122a0966fd1e3cb16d1d11469051877ed76b611b66f43a2d7bac054584a9e9b2567dd75c5f840c8573246824a15641ef7dbc4377dfec700fb618c1c0e40caf70cec74399f014b755172b69dbd2f7d4fb6b295c76ba4d74601759222c256921feea917d711600b961ec57c631f97926cc650502c451d53ed1dd4cb66afb2501ad224606705e703f891d434c9c0fe5a6f7814366564e7089c2a59d902dd83226ffee058dfd0d", 0xe6}, {&(0x7f0000000d00)="8e66f3b3d304887cc2dc588036aa", 0xe}, {&(0x7f0000000d40)="85e48b78e2635a52eb1427f4d5ba19a08bbfee105860b8ec77287af467fdcdc29f5b30bd444273d3d6682d400ecd49f7bdbe55b9edd4e852b2c7275ac2ca03b1e57a0729638692dd0bfbff46c608df5c0ccc0d76f595d88d49834f8c1c493dde38f90fb1a4de6ac949515d1809a4b5befb40ce2f6bd01f4b5be562fb4d6c000afacd644c35960832a706f3da117be81c7a798bb0bd65f1d52ae74bc1edebbe9bf498c94b142380561cb75184cbb918507c5455d7b17714a531552c0cb50ba9ad4f6d7c0378b3", 0xc6}, {&(0x7f0000000e40)="58db4fe71fb0df253d3aa98944b6d09526ffa6394bb480fc33d32d7970d6f2d9ba86bc714126f9a8e61b8146b4b36c3856f91e37348398c505a28f6be9d1e48f4c7801a2a3d9c35d6926ae51caf2ea2fe6699c6fbddab26ef80d4c38b3e7f92fdcb8234c525274349cd4e222b78ccf805bf6f36b2af89635bc0fde7596f29d2703be27acba89733be1799bbbde93ffe0b7077d695314a15de2668f5dfc8cf5c654ec9b76f0dd0a5d0dad39f7bc91cf11a4949bfedb84d2fcd2c09c70b9b57e2546b788047b3095ce4cdddf98d4ed4aaf2fb4c9cf2c64f5d73ab9a5a170781cdf90e469fe9f58dbad3a291ad292", 0xed}, {&(0x7f0000000f40)="381e46bef834c456c1d8fec063ce917d8eb5b0183b7ecd15740ed2446731f8396437c8c0f7d5c8a1e6214659fa127e132e17145e8f62e0e9d706ca0275db004f5075d430d2597f1cd40b84a2459e45eaa96dfad79921da5ff6ff1bb6384ed6e6539d4d4073802679c7654bb0ffed39f1a045dadbf8db1eff0a07f3f32f342a5f852b28ac0ff7ef046275060921a6925c7e688e317ab95e8ae8901366f158cff6a83968e234810f57c6595cfe16307f1408abdc3883f4a060", 0xb8}], 0x9, &(0x7f0000001380)=[{0x100c, 0x117, 0x32, "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"}, {0x94, 0x13f, 0xfffffffffffff800, "75a7ea5a1140ba6bd9667ab1f5683506c73cc23cf37602abce345fcd6fcbbcab026876a0d22db380fca6367c429c8b25322f1905d8a8851741c55e27a8aa7f5a0c691bef92b7e724afd9f599366de9fc5b69896c640265039a1d91a282df0f4bbdd078db378f96a3777896862bc706673003f58f69ee47ebbc37bf7b35316bfc8bac3cc3f8b7"}, {0x100c, 0x107, 0x7, "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"}, {0x100c, 0x113, 0x80000000, "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"}], 0x30b8, 0x801}}], 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x28, 0x3, 0x0, {0x4, 0x7, 0x0, 'selinux'}}, 0x28) 03:41:34 executing program 1: r0 = socket(0x10, 0x800, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 837.090699] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8959, &(0x7f0000000000)={'bcsh0\x00', @ifru_mtu=0xf79}) ioctl$sock_ifreq(r0, 0x8946, &(0x7f00000000c0)={'ip_vti0\x00', @ifru_mtu}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @local}, @in, 0x4e20, 0x4, 0x4e24, 0x9, 0x2, 0xa0, 0xa0, 0x2f, r1, r2}, {0x6, 0x80, 0x4, 0x3f, 0x6, 0x10000, 0x2, 0x4}, {0x1, 0x8000, 0x5, 0x4}, 0x4, 0x6e6bb4, 0x2, 0x1, 0x0, 0x3}, {{@in6, 0x4d4}, 0x2, @in=@multicast1, 0x3501, 0x3, 0x0, 0x7, 0x9bfe, 0x1, 0x3}}, 0xe8) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x2, 0xfff4) 03:41:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000fa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 837.137498] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:35 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x5, 0x2) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:35 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xaa, 0x2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) [ 837.355053] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:35 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x40, 0x0, 0x1, 0x72}]}, 0x8) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) kcmp(r3, r4, 0x0, r2, r1) r5 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0585604, &(0x7f0000000180)={0x980000, 0x0, 0x0, [], &(0x7f0000000100)={0x0, 0x0, [], @p_u8=&(0x7f00000000c0)}}) r6 = dup2(r2, r2) ioctl$KDSIGACCEPT(r6, 0x5393, 0x80001000824fff4) 03:41:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000015c0)=0x1000, &(0x7f0000001600)=0x2) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) recvmsg(r0, &(0x7f0000001580)={&(0x7f00000000c0)=@rc, 0x80, &(0x7f0000001480)=[{&(0x7f0000000140)=""/103, 0x67}, {&(0x7f00000001c0)=""/80, 0x50}, {&(0x7f0000000240)=""/196, 0xc4}, {&(0x7f0000000340)=""/127, 0x7f}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/163, 0xa3}, {&(0x7f0000000040)=""/37, 0x25}], 0x7, &(0x7f00000014c0)=""/132, 0x84, 0x8}, 0x40000000) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001640)={@loopback, @local}, &(0x7f0000001680)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000016c0)=[@in6={0xa, 0x4e21, 0x8001, @ipv4, 0x900000000000000}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e21, 0xe8b, @loopback, 0x6}, @in6={0xa, 0x4e24, 0x3, @local, 0x4}, @in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @rand_addr}, 0x3}, @in6={0xa, 0x4e24, 0x81, @loopback, 0x81}, @in={0x2, 0x4e23, @loopback}], 0xac) 03:41:35 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x200000) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) 03:41:35 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) r4 = fcntl$dupfd(r0, 0x406, r1) mknod(&(0x7f00000000c0)='./file0\x00', 0x8, 0x9) ioctl$VT_WAITACTIVE(r4, 0x5607) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000100)) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) fcntl$setstatus(r2, 0x4, 0x2000) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x2}, 0x100) 03:41:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x3000, 0x1}) 03:41:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:35 executing program 5: inotify_init() r0 = socket$inet(0x2, 0x0, 0x0) r1 = dup(r0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000001c0)={0x3, 0x2a, 0x5}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="51fd978da685791cafde63fc639ae3fd1e4a73e61ac258bcb493be0abcbc59ad885b3875e81cc508cc692b9128920842ebe2894f51840966906db7f54d8a963244b1104e6af68f6db9b21cd37ded44a891f63a497eda11712c1d9366e200000000000000000000000000000000"], &(0x7f0000000480)=0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) getgroups(0x6, &(0x7f00000000c0)=[0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) fchown(r1, r2, r3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) 03:41:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000b900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000b200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="cc0000010000000028bd7000fcdbdf250700008020ac5802c50b3a7e46f8e213bfdf346fe44264a4cd2ef5594b1e5492376a4242b71a7edd0df670a702d4cf170e19dbc4917bc585c70fc64b8293d37e95acb5c0573511e08476e32c0b18d0e9fe2a407d329a9792aaacef1819534d6fbce246dd2eaeb9d8bd2a9b1f4308c3d86eb9d56fdcf02934b6ac7c4b35fa0dd9c38282297c14fe4008dc191d746e2d0a13ecc8a033b14ad83eb3b1d41a49737911602f7410bbd35692d9a43a41bdefce", @ANYRES32=0x0, @ANYBLOB="00100000000004000c000200000000000000000008001e000700000008002c00ff0f000008001000ef00000024000e0020000000000000003f00000000000000ed0700000000000008000703000000005400120008000100677265004800020008000700e000000208000600ac14142108000600e0000002080010004e200000080011004e2000000800080001000000080002000800000008000f00010000000400120008001c00", @ANYRES32=r0], 0xc4}}, 0x0) 03:41:35 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000480)={0x2, [0x0, 0x0]}, &(0x7f0000000500)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000007c0)={r4, @in6={{0xa, 0x4e20, 0x1, @remote, 0xfffffffffffffffb}}, 0x4, 0xffffffffffffff87, 0x8, 0x3ff, 0x18}, &(0x7f0000000540)=0x98) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r3, 0x10, &(0x7f0000000180)={&(0x7f0000001700)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r3, 0x10, &(0x7f00000003c0)={&(0x7f00000000c0)=""/184, 0xb8, r5}}, 0x10) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000600)={{0x3, @name="e0d7d801d1a6a914f8492fdfd9d96265664dd2ed5b28cd79d8576bbcc966f3ee"}, 0x8, 0x6, 0x3ff}) 03:41:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\f\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:36 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000180)) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x2002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x117, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0xffffffffffffffff}}, 0x10) 03:41:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x486082, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r2, 0x180000000) 03:41:36 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x5, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:36 executing program 5: inotify_init() r0 = socket$inet(0x2, 0x0, 0x0) r1 = dup(r0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000001c0)={0x3, 0x2a, 0x5}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="51fd978da685791cafde63fc639ae3fd1e4a73e61ac258bcb493be0abcbc59ad885b3875e81cc508cc692b9128920842ebe2894f51840966906db7f54d8a963244b1104e6af68f6db9b21cd37ded44a891f63a497eda11712c1d9366e200000000000000000000000000000000"], &(0x7f0000000480)=0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) getgroups(0x6, &(0x7f00000000c0)=[0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) fchown(r1, r2, r3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) [ 838.486132] validate_nla: 4 callbacks suppressed [ 838.486142] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:36 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400, 0x0) ioctl$BLKBSZGET(r2, 0x80041270, &(0x7f0000000100)) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 838.568709] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2, &(0x7f0000000300)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil], &(0x7f00000003c0), &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="8cfec426d1832dca7f"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xc0ffffff, 0xffffff9f}, [@ldst={0xffffffc5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f0000003f000000]}, 0x48) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='vcan0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2, 0xb}}, 0x20) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000540)={0x10, 0x0, {0x56, 0x0, 0x9, {0xffffffff}, {0x80000000, 0x1}, @rumble={0x0, 0x5}}, {0x57, 0x0, 0x4, {0x7, 0x6}, {0x6, 0x9}, @cond=[{0x4, 0xfffffffffffffff9, 0x1, 0x5, 0xa354}, {0x8, 0x6, 0xbcd, 0x7f}]}}) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x1) socket$unix(0x1, 0x1, 0x0) 03:41:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) sendmsg$nl_generic(r0, &(0x7f0000001440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001400)={&(0x7f0000000100)={0x12fc, 0x2e, 0x14, 0x70bd2b, 0x25dfdbfc, {0x13}, [@nested={0x11bc, 0x91, [@typed={0x40, 0x10, @binary="41b37ace9514d8285ba0db63af5eb71db1f3106818ac954e368e5ab530fd711e23513ac9c5dfc20265690275894d030ec65a31c51e87ae815299d682"}, @generic="11bd8f0cd63be10c499ce226f3087707d3d57e03e1e74eda73d6be658338fc7ec33797", @typed={0x44, 0x51, @binary="f0d094441ee69874e7eacbd387a3277205210114b7943022119390776da2eed90e5098c8f0d0be9e766409846ebeca9f359f3c6a136f8910a1c601e6c1e32b"}, @typed={0x8, 0x65, @pid=r1}, @generic="ac443800f2320d986785133bdcc582747e59a6ce6c0c72e3f7d81d323abe6d1885c16a607edab76f6082f3b5a5e86710c878093ed26ad39a32a688bd4b21c63217cfe40c8bb50981620079e3af0dadec81a9a4e41aacf464a439ac8a130215e3cfb4958a3d5fe07cd1954f3d44009a02589ede611680166c3a22761e170dfe32b7cd0afcfb27691776cc5b966d6a9ea2c91b", @typed={0x4, 0x89}, @generic="b5ab70621274402db550c21ba15536da4c640e3f0c7404f51920f2fc637838ce43a531885da4611ce09408de198865cd48f176849cf297e3300d596c643ea63cfeacf857e28a6199e96a453d9bb866dde1afc1738775f28e97aa432c50d57ec19fbe904d24d8da67e8ae03306d5d99ce", @generic="9f6b8c57cbb96bd8849cf232c4c8bf1114f2d757624672588103e047fbc23f895030002f8e5cd5f6fdd86007fa4de2c4c0e50b6fbb97bd8b4feeacd5e2a55be159de472913c8ca622f163b24a3866488b93006d89610cb2fe1d5d580994ddc1142169460ddc31b2f12dde2693e72fdf574153874f4ed24502b75485f2d3975f121992c471eccbea1eab8605b86de0acefb6c3939120a179b42896199ce8d679e81ca2a21d57cebde1cd1d152a7f86fb54908d153c6f77e89f472edc53cdd0a00624d7c2b0f9d322edf61b67589de0581825bd8d3a32ccdf080606db6ad0fd42bfc38cad93c0dc028aac0d4b4e4a01946f7c1c1236850548b296c41a61205bea428c10bc2a63b70512ba3737e9be3c580f8c27c1fe743260dc75dab42ca8cb88fcfb2693c61e7b4312320397f8365d6af1261d1c731741db822313f5c5700f65081b31d894aeafaad0bd85f3f8127dd5cd48bebdf9098db053ff599afa2fd2c33f4c5a2e9cf6f2efd69a042ed065ab73d8f1dce04c160b6d0d4fa44f332b77b3bc7dee9d2a69b76e19b4c3b7b76fd1d817cd6a2aea91e46a250f7664cdd2f83efe9a8619dde4bb6a2ae449f45688322f1dbe1aba6f26bcb29231d6bd4aa46d7d1cbca1e3e8de86d9ca10271207d09e806fb8ab793a2dcf9c99b49ff583ea460a325a794ba8f9e93f3a2bb76dd6c5880363d7179f78e8dcfdbcafff6ae0149af58536bc5b63d884251efa1a410e9b7364601cd2227a23b434e6bb40840c78c594a1cea595f50f59d93720604e74177850f725a140226cb2cf1cddb86166132274a368853605fdbb84a09f8af00fc15914374598d8572f8ee2b1a68722d4e6cef7dc760e3b798fc7160a231275d77620e4025cc1d053042c7af0049e73db045e4086d904c5c609656b4a935023f40157c3c21d34ea56a6326c5cf48211e20d1df765fc3ffb576738176b88b1b09d341b83c1ff080f7aea97a987783c4389345946508704189690e9ade060587aa47a73b4be7033e132bb2389812ea619e59f2fb099f27d1d560617de382fba4863749725c105ee0a7c4a739d57d0454456bd3f6010167924f747a6cecac9c519ea771fef86025bf8cadbc1236c3dd67e0edf4b799947df932c5d56923af2229911fcd0ddba5f4bdfd8b1de51df3dfbdb1f615a281483c335010e6f4d7b1a1906bb67a791e0bf7acbbb0b366e1b64b9ec206bab9b904801b34c0e24a1ace8de70d1013ede73f437fcbfabf0a39bd4d73f2e930f1def38f087eede474eacf3ac86aa386f4f6693e587dd17d4f79e6e99259403765fdef3e5d98906410319e2e88a345fe2db3024ba3904d5278c06b523bbe06ff75ad02c2d94f66dca6e439b971ca934a822482d67403e920df6fd94bf8b962c2e3022ad1d6e4aea293d4e54e65d79c777477df41d57af4a603cddbe84881b5ba385c0471fcbef37b49e81a1c4abdc88dc4d2e3ac0e85ba40a38f091871fce47f42cac27f634d741b58b43934fde4ead5fab3244b119b0fbe9f046caf7a68367f7132833aae4d9b1f1188d96abc290a774be0f3c133c2dedfc1bed7a85091b465d2cd8ad1aee944f30456835b5c87793c01bb8627a8be6f0430b6ced6ceae996a5e09d299a2d0c098527c3fc234b56a6f40633907922f4919d541c55550299dcbd02b7fbd9eb75889c8597195e98f6ed17bda567dc4cf917e8f2b9a105cd610347cf514e6023c8cbeb21af293afb32015409b7920c80a922d8ba72d20f721107753f0b5cf32d59a40d588a5db8b39cfdefe04d678764047d568631d076c86a97beed43bdff64cee751dbc59f6f11bc36ef6584c8469aa686e13c16cdf55dd025df3cc4324367894551eaa9490c3b8a420cb2ace01938fffadb46b9e9ad357d7e5df9adbf52171fd8ca221001136b1b1a8db819163e172f4d5f58e8d2eaf28fc01794d478610a83d4acb6e5a2946f802b25e33f2495d5ba5572ac733eb3c497c31d69538805a6d94d828e0d8f868ed7ba74603fe90972eeda6b6465bfc742bca0df189a06c58a2153ef187e356c006a317eadc222b794f6bbf6b7ea40f58f04a288a805a72b184b1dc995eb9811d6deafd1cbb3894b1fdfb97f77068668599e312f4332a829eb5ee06175be1f58b9ba8056ebd2e0d4c0453e9b9bb713735cb7134dcee43331106a558070692a6aab185d72ff11fde6f439e6636880f94b5f81b381bf91a26d4cf870f524d7bdda9e828848175a3b8281f9873c5f8f68d4a257b8823f5fba5e5423193829ab904726fce4b5dbfdbb1701518015a7d094993eb6cea05dff38e22d4ee3ebd0faad8eb78b6c1d45cfa560ccbe8e1d9d587cb262b78457d20b35696d277fe0b63fc31d0261f76e4fae14a1c692c33dd959053609e6decdac93dacdd334efe2e8fb018267ea216ede44bd32f3681d7fcc82f34e7756c76e474aed115bd426f16efd90097d12d4be311a702302189e19367348730b6d74806ee55db6472954e1337329d1bef0924762d3bbcb1e8cfc447ddb1311f29667930ed7acdc4a58d1b422a515bc7a39cec0f336b0702a3853583a116ee7cbae601cc43d7221afc025081281bbe47d60e5bd39519e23066fd12b67f6e73feba607c743644d68dc2606efc6ad381c71904798cf96d72e52d1799f6a0a1258a1cebbd20999ed2fd5e8a35beb374fb65565a634251645d388b43020029eeffb6edd5a98e178130cea021078b6e664b84ca4b436f4c2147e596802c6aaafecf88a70cff10bff002bb19f6ce54dea6c6051147486e6b2d1f1fd108438dbbbd5f4022801b63356a5c7b6c814d4657f1762dea27caaad6bd0c2cbb146c374ada154a130303e11c920270c4f9b1c26b609d75ac5e1e4b057eec0952184b946f33a6c8e5fcfaad169a945fc726c04b2b347138c34151555319f31c3065f999e739a94c11cc276c6aa61d8cb37f1e933c23335c67b702bd05d7881f1693f9c1ea8ea1582be8028ffe17b8981e6d156e9875fa0fa7bfce39a34391dae1ab192a6ea2094c384ee168d02c7f798b861ea088464bd710f41bae3f770e169bc5c1becd4829f4808f755c5d77392dbf9a954f7b0798e8df72571e31d0a9506713e6ff81fcb070ff526e396bf10789172903c623ae713f56f36abeec716017d41b504b5e2839b271fc4c2862f950f40e10c6533794a9d7f6e454785e8b7627644e5b23cd2317a2a530a5ea5d2d54dfa4ba20d0347bab3c6a89e8fdc266ae6c9cf8d74653bfc03be29938e789b25b1f575046db44885a256bfceadff8eac9cbe09e23887b5f1ce7a43925c504242fb15f9f7ce873e7d17b795daf39146dd63e16951286c8c453ea34afbef112e03cfbb564a730f387aa91614f5f2fcbbbc9a167e3b4f31fca95237520efbcb471083768fcee447bca69ace9245e14d3d82f22ffc009c0b677c305be11c05e8561920a18ec47e9da8c90ff03dc630a7640a89f2ad25115bdee0552485be78d63075d6bb0d51050d303c4ca7579df68a6ded735a0b11fa36849398d2b1313035cbe6ebfa209d904bf5a8d900cd43e9e8cc032db371010f041374a97ada0726cf98e5917486bd9ca8918a7e2eee9a0f20ca412ea60d124cbce04035248699aa8edc522c7626b4cb5ed1ac4d2832b08a415a8d12d289bde0299a4c97ca6875f1f495466364c2ee47a7af28c060f6ee3fc831151eac6ccd7c6c38832e47e7c3fcccb16dd9b38c8587ee6653aff4852fbc36fffe98e1301f916649a4f8f8d5bfc76c9601a90c7272fe02791025865c77643d6a88e389d6195d57e25167b791091c8baf064e2a21d5446e3ead42bbdc1cfc5360e81a99e12ad31787be4bbe8056c61222ed8c60d4041e98bb7fdad1217958bd1f4e23e17caff7ef3dc4ffc1856e1af94265763bbbf51a8eab321498147c2537b6ad40a8463c8a64ce94f0e1f82319c16c5edf275cd5f8bf7da20290904bea33ca2dfc02b2f6a5bc63a89a6355d220be3142d2a13639747793f435a46b32786194eddf6e2b2b6abde27cc35cecf536a9e659ce03eeeee1697427cc061faffbdaac07bca84a752b19d92953237b459412ad7f0f5a4e79c0b426ec49c6e677a013379827a940f0eab3da6a11d99813a8575cb1e41df5add3d9ebebfba8b783af460932bfb2eeab0aa3f4378a7928b8c7a67055aedd8194a08bd4fa18fd8294aa535912f7b78b4a41c0b36d408db7bb2e1a57209370e4543a1b8220c460b4835381ceccf3faac13360b421db73cd02d449fcda2c4a3b050f7b485c893821766bb488c4485624c57f0720aeb9df5b42a647b50e75edf6cb4da232dce952eb828ca7dcbe6518c5c6e31c7afd2d6984f19222ab9a0d90963b7f3e5e8a04fe1f14c5c9eabb49cedb3307ff91b3cd6f6e5ab68345870d7f00bcb676066cb7d90a0d6ee02bd040d4f04ede304de1d92960d367f84c04d8c4365e71dbca4475831bd7a665e63cc150c7c8b26a0f45c10d05080f67c75541e4e5e1c5fcc501792448a125502d47f947ddbd5d76e1683b6542eb978449c7c9772913652b9dcc4a871576880f8cb8f020b9b0e00d91f033200c17f515bc132d6743d0338a8246361d5bd63f22e18f001d38075ca83b07b29aa208befe98377d9767d9a25af1b67a403a4345abf28a13c9acd1db8da15fd80249b33f25a5eca6ea74780c62f1f4d976a12a08dc5636b714ffa4fdc51d1798d25758e4afd6b485725806b06ed478aa3f80197c64178ed9245b96b9721aae871c5400c45aef411e058d2ddcf2b3b2fd4fb630ad31ee1a9192e3c9620360557ad65b3ba984a618c3b6a14fdad60b6e0ae32d1e77a39a2cc403f3a1b9381553ebaae03ee28a7a1467d5b45e102baa53a008c02d8f28b6a44c24979c8ca323923748f49c0cc3b5ca273735cbd3f4b95e289c6041a94245c5924e1f7cc502be32fe813b6eb8b2e67cae940756bb227c568ca1878619288f3f8dc177527b71312363cf9e955bb4ee00d1e0771545fb66fbc23e12ddfd1f91c332ac821784e19e695e0ccbc7beacb04c78ece2f7d999dc42eeb12b945874b7d5681e9f18951799c6fdb4f2530cae4f606dc55a4245b5e82a5da41a8c90019ba6f42f348b666490afec77425563793e43d8142a6a1202cfa4e7a993bfb54c1e389842ca0c34fca06c9258915c7862406407885e306b95e049a76659e8e386420c30887d846c55d338d78fd4c041233da8bc5b3e73df18c31a520bbfa507cd45c4e24308bb5ea2df77c30e6277b1d5b0c4234de04e12920fdb6b4255627d3794f69e188614fc21d593878870c739f6461d89c8ac91578f4733b61a58e2d49eefa8cd755dbac0cb673d6392aa96eee17ed12473a23c4e4073ab48ab71c4e689fce847ae9dd58c2763a261042aaa6246e65b3b5cbfe84321aee8f0738354d64a65a16c329cc2056b891062fac821aa1488e53cabefd2a3175dd0e4588b3176ee3d507da6ccb6ea81bd9bc400acd88b2938183e5b08d6e6571b0af027bb87005504520c85e506f7b361a7a6305cd2e55b39c4220cbad66f26f17ae333839939cf99f778062d5bf688ad791bffbf3e98ba3ac77f888f2ef341ce7d7858a9512458b116cd17f1f8e6fac64b37a70b84fff70e63c96f70e5ae1255dcc77a3f10a99fef41560716435272e78ab2c77dffe6234f57ad3f6760ea078fe076b5a7e76bd3220a207d6966ca6de333de96583b6c4fb2567d82d46ee66b1f084524bf3abea485caf5bb0f2fe072d3aaf33c477d879b53241f7d7a70c945858b3fc246d4eca70b78aa5bd884ea0154ac6a2ce23b06bdc7"]}, @typed={0x14, 0x1a, @ipv6=@local}, @generic="5316a7b4fe6a44d43bc19f83eee7e664ee0e30f5bb11b2517d80d9d7dda9f71ded6ac4c0738cb884c17917bcee7934b1a17c3eef7dbf9fd4f5", @typed={0x8, 0x1f, @u32=0x2}, @generic="879047892f07bdd2497311dfb30b1d358b503f33602ff7b314f69283f0baf5baad0ccb629b8a2bf78103fab59eadf4ca67c1d01d2fa7a5937ca5e24e7ee73558d7b873e903f6cab53781d932bc8ff10bb06185282f80e02ac4d4b5bd3f666f4b75e80ba97cdf665ff1497e8d87363e9d3b6008b2139499863d3310c5e3e217a89b700f6f68a918d60a22c2f04d3eec489ec4b41b92f13ca69176919fd80c13b08a7fca32c5954057ec301332340ac7c20eb7daf566958a932e49244cbf24a95d806fc4c80a77894af04cabb77f836c1047d470e24d"]}, 0x12fc}, 0x1, 0x0, 0x0, 0x8001}, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup3(r0, r0, 0x80000) write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) ioctl$VIDIOC_DQEVENT(r1, 0x80785659, &(0x7f0000000040)={0x0, @frame_sync}) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 838.806726] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000580)='cpuset.mems\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0xfffffece, 0xfa00, {&(0x7f0000000100), r3}}, 0xfffffffffffffdd6) r4 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7cf, 0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x3, 0x2d}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000340)={r5, 0x10, &(0x7f0000000300)=[@in={0x2, 0x4e23, @broadcast}]}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x5}, 0x1) socket$inet(0x2, 0x1, 0x20000000084) 03:41:36 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e25, @broadcast}, 0xffffffffffffffc3) sendto$inet(r1, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) socket$bt_rfcomm(0x1f, 0x1, 0x3) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0xfc41) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x21}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x38}}, 0x8000) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 838.867165] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) fsync(r0) 03:41:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) 03:41:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ab00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 839.074733] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:36 executing program 2: getitimer(0x0, &(0x7f0000000000)={{0x0, 0x0}, {0x0, 0x0}}) r4 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r5, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) r6 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x9, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000500)=[@in6={0xa, 0x4e23, 0x40, @ipv4={[], [], @loopback}, 0xfffffffffffffeff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e24, 0x8, @empty, 0x4}, @in6={0xa, 0x4e20, 0x40, @local, 0x15}], 0x74) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r5, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRESDEC=r4], @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYPTR64], @ANYRESOCT=r1, @ANYRESHEX=r0, @ANYRESOCT=r5, @ANYPTR64, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYRES16=r2], @ANYRES64=0x0], @ANYRES32=0x0], 0x10) accept4$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$TCSETSW(r8, 0x5403, &(0x7f0000000440)={0x10000, 0x6, 0xfff, 0x2, 0x401, 0x1f, 0x10000, 0x20, 0x600000000, 0x1, 0x100000, 0x401}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r7}) fsetxattr$trusted_overlay_opaque(r5, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000040), 0x4) r9 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r9, 0x5425, 0x0) write$binfmt_elf64(r5, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 839.148831] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000bf00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x50}}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) accept4(r0, &(0x7f0000000440)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000004c0)=0x80, 0x800) connect$packet(r1, &(0x7f0000000500)={0x11, 0xfd, r2, 0x1, 0x2, 0x6, @broadcast}, 0x14) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x103000) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000040)={0x1400000000000, 0x1, 0x0, r3}) r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x109000) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000000140)={0x4000000000000, 0x7, 0x2, 0x100000001, "b50afe2e5cfc485c07d214a740ccce86d17ea2d15a213dccdc9e057825839aef"}) getpeername$unix(r3, &(0x7f0000000300)=@abs, &(0x7f0000000180)=0x6e) ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000200)=""/237) 03:41:37 executing program 1: r0 = socket(0x1, 0x3, 0xffffffffffffff83) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={"69705f7674693000ff00", @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001080)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000010c0)) r1 = gettid() r2 = getpgid(r1) sendmsg$unix(r0, &(0x7f0000001000)={&(0x7f0000000d80)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000e00)="b57692104632c0a7a1258bf177e981388844cd0788f7dc3a1b70b3c6d1b37786c3fe5b2d754a1b24063aa19139d919919a365d7f534a9e262799d2c1716d259c9d3482b92e44a5892cc105fede1589150de188c411f66bc5577b04bac5c8f6c0ccb871de11ab4b27859837a2fd1d607ce8347f49fda73f96cb53f7ea604e4a09cb1f1a753dffc930ac7dd35f0c5b03c1eff165fa333e61ad14d86e70750789e3b7b32eaa4484d014fad6594e320fd266c6a0b32291", 0xb5}, {&(0x7f0000000ec0)="3ddbc2649b30c47bf850ceccdaf076105eadd8d1835f3c93feab35581b71f5d6ce3f0ef6413f135c4c7d59b63b11ff4165b399caafdd9cf484c09e62", 0x3c}, {&(0x7f0000000f00)="c2aae8934b5e6693486b760f7619cb273ff36d1f627ded8f6eaed08ea06f4db8cd422bc6ed577f4c3add36f488a8a3874ab4d48f70f17d084caa399aa873ad55216346796b7a3ba07de240fae77c0b7c3d61a2118ed5a27614621f23bbe7dbf1d111f56819f1a091e8eb18c62e5e04098ac1372a6a1f52bcbef3f542f49c4fc8c38c46ffe48e22467aad1261b434bd361c9d49dfe139f1cce89ded01", 0x9c}], 0x3, 0x0, 0x0, 0xc885}, 0x4001) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000ac0)=0x0) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000cc0)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000a80)=[{&(0x7f0000000100)={0x40, 0x12, 0x4, 0x70bd29, 0x25dfdbfb, "", [@typed={0x14, 0x2e, @ipv6}, @typed={0x14, 0x22, @ipv6=@local}, @typed={0x8, 0x88, @ipv4=@loopback}]}, 0x40}, {&(0x7f0000000280)={0x258, 0x40, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@generic="56b84410ffb1bfb02f195c95aa7bff066a4884e803733f31a3067c7d207f4fc2ba98f553ed3de612aabdb79df76512a11ffe7b068c4be3175e0114b44354054969973f13499300339879d1bf7e6272bfb48ecf6fc4066cb2373e948dbe", @typed={0x8, 0xd, @ipv4}, @typed={0x8, 0x8e, @u32}, @nested={0xfc, 0x81, [@typed={0x8, 0x8c, @u32=0x101}, @typed={0x8, 0x85, @pid=r2}, @generic="73063466e2115ffd8c43800f28a49dd12a7660044bf4978dd09d4cacadb617a306e5ea4cacc613d9b059f3b9c2f737a3493a99b6149d4e466b210dbe91c80d1a00897c7cefe8621d65eb3a063e30726b2568fcdc46eb40785b528de1f1cd89440bf25986bebc7081ae4e3ac44dd703340f2b2d14f67b74e8b0f38e51396c0bb7cccead1884536af578bc39bd86ef9a37a3a39ecfcca34503f33c44252da4b0dd80072e1921e56a559211da97266bade4d9a7ae7cf3abd63dbb3bc20cbd4ebb5d7942eb02b6421244adcf3366cbb5e42b4aa3a1ac91967a71cf1cc6ec0dda9aec86b00ce921381bb1"]}, @nested={0x70, 0x13, [@typed={0x8, 0x3f, @uid=r3}, @generic="e4ad8fa99408b33aa9edc0153fad97ef10b312facf4910fac73104f9d80b12d0b46db9fa99a8a218a6cc8b09b13ea1c7c07363c227d67a60f088369d921c317a00c91b7ae8ed18b39ac8e721e1b41a8837b28456fc3ef112aeeb26cf1e269127fc3cd872"]}, @generic="7a2203266890f64496380e8ff3738416bb793929c71d5400e88e9ec78cc3c3ac8d407575440838d1e35f5e18c2fb9cdb36811de30aeed118d71e44f526efd741d8777c4283c26528eaa65f3ba3daf09a50e53d0bc4b904e261465e41e8e619c02bf0b3b58d707c209e90de92"]}, 0x258}, {&(0x7f0000000640)={0x42c, 0x3c, 0x20, 0x70bd29, 0x25dfdbfe, "", [@nested={0x1c4, 0x1f, [@generic="2e176c79d6d61d558816003f93f2adf29f31400f603ad113499d9b6b3dbcc59ee515c41a7bbf3c953003e015e606c746c6dc48baee9a97da46d6813fbbb444e03f532a0434547d052cc312ffd23fdc8685062365e0e3da7a78753098c2c36c85f20c2b7a8c83a61ce4ccdc3ebf5ca13d73240b7b73a902eb4ccd346034e5fb5e0bda30de4d4cacdd3adfa624790b0236e11edd7d647e862aaa28afe7947fa6e8b02ea0cebfa64a593b56ee681872eb6c4ff9c4725ddd0065a79d257b9cc45345b7d29156fe9cdbaf8c8be328a11faa177b86d2907acab2acdd5fd6fae977a350c5131fbf6e", @generic="a734746d9241d0af8b7aa096a65e3d378d292fa0cbc2a4773e2c32afcc05448a07c329a56425414b43a85a577b8d18309935e634a55ea7911dead4e1bbf1d14b8419b962574b97608b6cc6d0039cf75847b05cc4daf7efbb0802a54e6e84090becdec0125ce12ecd7d4965f9b4d6a55571dd98637823143558ad6a0713708d6f832cafda8683d9ab3389fb3b2e9e7d7565f5c7a36fc355794985f4c0e82da39c94eee5da2cbfefac9cada2f152b00fd4b4b43f97acafa895531298de4680f96f17c2dc49af7ca0879dcbb6d88044fd46982c699d533e4209"]}, @generic="c0ae35501d401318487fc32ce43bfc69c9648e904e34a3475c62cae6c86b7c6e", @nested={0x170, 0x57, [@generic="bcab8896f67f1d871f7d74826bf58b754cbf81a452bfdb9c842c0fce01a61c0d4667dc6616d90e07a91f7aa1130fe370e9fb502609a0b5bd75ff495a61d6e75beb170e3d8964c04e951284ad86cc8e57f991faf3fa0328d0d58e750de4f8", @generic="41470952b7e6224d12f9cf362704ecc75de5e9c23ccfd22c2e6b721d2c552615b36799bccb42e483d60c1f97ed964c21bfc1f7a376fa6a34ae79460aaeaa370a1b569140e25b8007e973162da08e709f2e", @typed={0x8, 0x12, @uid=r4}, @typed={0x8, 0x52, @u32}, @typed={0x8, 0x8a, @ipv4=@remote}, @generic="b1219cea74734c2d7a2238be6cdbb616106ccb2ddac7c1686501c7e649f9d3e0b56b019e1e72819515476cd92965b62568e15ad463eb836876e29bb84516af9cdb022bca344a9e6a7053fe396ebd1576e9b735aa5dcab52e8e87658122b6836b686a535f1f554a4d8a", @generic="2dfdf7c142263d47f91a180d5f07850c9a8aa062660863b8a4adb0baa01a8f6d79b81ebd2aac55d52375", @typed={0x10, 0x1f, @str="69705f7674693000ff00"}]}, @generic="6351a6c38afcb8329e3b7a78bc143008efc581ef392eadad2b87c8a713f2c27b5fd50be4a59af3121efbe0ae66658cf3c833288982bd3e1d7765c167adeb252819302a2d35eabf8edc067e8ce94e907e9d9422e122e6c8341d8f0473e1da9cc6d6da19d9ec4f6ec53b225f45c10d4db68bd04fa00b1c27bee6615d2d6725e4217f6d72747111fa54da7e283f53d92482c47a6821fd369de4379002e6fa22ae79863d003ec2ab7f757cd906c4e5ecf9423fe27dca6297558efba23721a30738ebd8f2ba2c7f15"]}, 0x42c}], 0x3, &(0x7f0000000c80)=[@cred={0x18, 0x1, 0x2, r5, r6, r7}, @rights={0x10, 0x1, 0x1, [r0]}], 0x28, 0x80}, 0x841) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r8, 0x80045700, &(0x7f0000000d40)) 03:41:37 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() r1 = request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='\x00', 0xffffffffffffffff) keyctl$describe(0x6, r1, &(0x7f0000000240)=""/233, 0xe9) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000140)) ptrace(0x8, r0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200800, 0x8) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000000c0)={[{0x1, 0x0, 0x8, 0x10001, 0x9, 0x20, 0x80000001, 0x7, 0x7, 0x8, 0x3, 0x401, 0xffffffffffffff80}, {0x1f, 0x7fffffff, 0x742c05dd, 0x4, 0x5, 0x5, 0xfffffffffffffff8, 0xfffffffffffffffb, 0x3, 0xfffffffffffff801, 0x0, 0x8, 0x9}, {0x5, 0x1, 0x0, 0x9, 0x1, 0x1, 0x1f, 0xfffffffffffffffa, 0x5, 0x4, 0xf712, 0x0, 0x3}], 0x2}) ptrace$setregset(0x4204, r0, 0x46e62b7f, &(0x7f0000000080)) 03:41:37 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0x781441) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0xf, 0x1}, 0x10) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x8d7) r3 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r4}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400002, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x4000) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000080)="66baf80cb8fed4468cef66bafc0cb0ebee420f013966baf80cb8ee38898cef66bafc0c66edb9650900000f32c4a3315c250800000000c4037917e80b400f18950000000036470f09b9800000c00f3235008000000f30c74424002d010000c74424020a000000ff2c24", 0x69}], 0x344, 0x2, &(0x7f0000000280)=[@cstype3={0x5, 0xd}], 0x1) 03:41:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000bd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:37 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(r2, 0x2000401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLOCK(r4, &(0x7f0000000100)={0x8, 0x35, 0x2, 0x3}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x200000000005) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 839.639955] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x8000) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000000c0)={0x1, 0x3, {0x4, 0x6, 0x0, 0x6, 0x5, 0x4, 0x1, 0x7}}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 839.683584] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000fc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000f00000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) 03:41:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @host}, 0x10) 03:41:37 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 839.902012] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:38 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x8000) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000000c0)={0x1, 0x3, {0x4, 0x6, 0x0, 0x6, 0x5, 0x4, 0x1, 0x7}}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x7, 0x10000, 0x7}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000fa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 1: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_mtu=0x100000001}) 03:41:38 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3, 0x80) getpgrp(0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) timerfd_gettime(r2, &(0x7f00000000c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@remote, @in=@rand_addr}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) fstat(r2, &(0x7f0000000900)) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x3cc, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x9, @ipv4}}}, 0x48) preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xffffffffffffff0a, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r5}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r6, 0x5425, 0x0) [ 840.413145] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:38 executing program 1: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffff9c, 0xc044565d, &(0x7f00000000c0)={0x6, 0x2, 0x4, 0x1006040, {0x0, 0x7530}, {0x5, 0x8, 0x3f, 0x8, 0x9, 0xfffffffffffffffe, "3eb774ce"}, 0x5, 0x3, @planes=&(0x7f0000000040)={0x200, 0x1, @fd=0xffffffffffffff9c, 0x4}, 0x4}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x40, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000180)=0x10001) read(r0, &(0x7f00000001c0)=""/168, 0xa8) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f0000000100)=0x7fffffff) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120010000100697036657270616e0000000c0002000800020030000000cf0862def1c715817c6037af13651abed0d2228c086d5f66677b4ecde360ef5c43015b6fa5c6c3e347ab208b267cb06c25785ce994ba417200723b59cc93f3167ae029b79e5d7ff15250d16a91d19469cc5e93956b9abfef030e261fba673466d997f7323685f289353660b88785e523d86f4b8e12d0df23366b3fa23e3c800c1b77dda8c35bfc5a34d425d68beb555fd37139cf9b826076398e97a38e61f51166d72e0ee62269a1d997efa7deb433fad6524cadf552cc4cbfd4d58ee367f185a2a14be89905e385"], 0x40}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local}, &(0x7f00000001c0)=0xc) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x995, 0x12000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="97a8"], 0x2) 03:41:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 840.564955] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:38 executing program 5: r0 = socket(0x400000000010, 0x3, 0x0) recvmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002700)=""/146, 0x92}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @multicast2}, &(0x7f0000000180)=0xc) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200)={0x4, 0x7f, 0xd2e1}, 0xc) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) r2 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10050, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={r2}) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e20, @local}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="00000080000600000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000280)=0x24) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000002c0)={r3, 0x100000000}, 0x8) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 03:41:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x3, 0x82040) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) prctl$getreaper(0x13, &(0x7f0000000040)) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 840.697981] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000e00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = dup2(r0, r0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)={0x100000001}) 03:41:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000180)="27e382b958f7966694d8d815779952735e259621abf20ec07b0f4500c6fee0f2c573f08940da8e0b73d2a05510dfa1705cabaa4682532be051402994423e4f36b533777f101982b4aed51e104e928924244f412be706b5cf028fc0ecea94896d3171666baa4d33b6ffb368321d28fa494fd28fd17f8844c0", 0x78}], 0x1, 0x4) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000140)="29c0d4407a397c77e070c48f9cdc3faaf2375181e8e485d0c55b84645bc6706b05fb19959eb7a675c5bebd8a3d604fac", 0x30) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffffffffffe1, 0x201) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000100)={0xffffffffffffff80}) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000000c0)={0x1ff}) 03:41:38 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x48000) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000000000000000000000000000001000000000000000100000003000000030000000000000000000000000000000100004000000080050000000500000004000000e9c4000069000000000000000000000000002000e21fbedfb079f698f0c46adbf41a58304dd1f6074c78c0441b1ad9029b3fe0fae3cf1233d3de1e4b1e09807f5e94ea4dc506df34a7c50134b715bc91a69abfb29ee27f28a3e920bc23cf9cd0b0ab1e7796e3edcc35bbb4d76ebd19"]) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:38 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x60202, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000080)={0x7, 0x2, 'client0\x00', 0x0, "3be0abc3e1689eff", "a5baf1d6cfb91656c117ff5491a031a6d108138cb35286987ec060ba140eae4c", 0x100000000, 0x400}) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0xfffffffffffffff9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x100010, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x200008) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) accept4$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000540)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f00000005c0)=""/41, 0x29}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000700)=""/63, 0x3f}], 0x3, &(0x7f0000000780)=""/116, 0x74}, 0x2}], 0x1, 0x2000, &(0x7f0000000840)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000880)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) accept4(r0, &(0x7f0000000d00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d80)=0x80, 0x80800) accept4$packet(r0, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e00)=0x14, 0x800) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001300)={&(0x7f0000000e40)={0x484, r1, 0x808, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0xec, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x365}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x24}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xc}}}]}}, {{0x8, 0x1, r4}, {0x78, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x37106a78}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x1c4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x749}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x1610a80e, 0x73, 0xee6, 0x7ff}, {0x0, 0x1000, 0xd1, 0xf8}, {0x5255, 0x100, 0x4, 0x1}, {0xff, 0x280000000, 0x1, 0x7fffffff}, {0x1f, 0x7fff, 0x2, 0xffffffff}, {0x1, 0xfffffffffffffe00, 0xff, 0x1ff}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r10}, {0xe4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfa}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xb7}}}]}}]}, 0x484}, 0x1, 0x0, 0x0, 0x4}, 0x4) 03:41:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x9, 0x3, 0x32c, 0x0, 0x130, 0x0, 0x0, 0x130, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, &(0x7f0000000040), {[{{@uncond, 0x0, 0xec, 0x130, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@unspec=@IDLETIMER={0x44, 'IDLETIMER\x00', 0x0, {0x1ff, 'syz0\x00', 0xffffffffffff8001}}}, {{@uncond, 0x0, 0x110, 0x130, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x9}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x388) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0xfffffffffffff7e1) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff0043d4000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) getsockname(r0, &(0x7f0000000600)=@ipx, &(0x7f0000000680)=0x80) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xa13, 0x4a00) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0xffffffffffffe2a5) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f00000005c0)=0x7fffffff) 03:41:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000bc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:38 executing program 1: r0 = socket(0x0, 0x3, 0x7) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0245629, &(0x7f0000000180)={0xfffffffffffff800, 0x7, 0x401, [], &(0x7f0000000140)=0xfead}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f00000000c0)) 03:41:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x123002, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0x6, 0x2, 0x8}) 03:41:39 executing program 5: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3, 0x80) getpgrp(0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) timerfd_gettime(r2, &(0x7f00000000c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@remote, @in=@rand_addr}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) fstat(r2, &(0x7f0000000900)) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x3cc, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x9, @ipv4}}}, 0x48) preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xffffffffffffff0a, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r5}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r6, 0x5425, 0x0) 03:41:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ce00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:39 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x8, 0x6, [{0x2, 0x0, 0x8}, {0x9, 0x0, 0x2}, {0x4, 0x0, 0xffffffffffff5f55}, {0x7, 0x0, 0x200}, {0x0, 0x0, 0x3}, {0x1, 0x0, 0x3}, {0xfffffffffffffffa, 0x0, 0x101}, {0x1, 0x0, 0x5}]}) r1 = socket(0x10, 0x3, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {0xffffffffffffffff}}, 0x10) ioctl$sock_ifreq(r1, 0x0, &(0x7f00000000c0)={'tunl0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) 03:41:39 executing program 2: getitimer(0x2, &(0x7f0000000140)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getparam(r4, &(0x7f00000000c0)) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:39 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x9b5}, 0x38960ef549585c7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="861fff0000000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x1af}}, 0x0) r1 = getpid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000d00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000fc0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000010c0)=0xe8) sendmsg$netlink(r0, &(0x7f0000001140)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4000000}, 0xc, &(0x7f0000001100)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00'], 0x45c}, {&(0x7f0000000640)={0xa8, 0x17, 0x600, 0x70bd27, 0x25dfdbfc, "", [@generic="0df5876a22f6008e73da363026df973bd0882a2123da0a80f56db7c3435d92b94694c17bbd4c60d32dd0e68551290f6be7c0092d3584854b29f94dcefe9ecdf6bcd0b24e4135953f97aa38b2537ddf396037526578ddd2eb0c2f32735e0c632a1a814cbd8657b42b552a0d5d5ff9e7f0f15a5fb456422de14f44854ebbb21d44f7e16f33", @typed={0x8, 0x96, @u32=0x7}, @typed={0x8, 0x8f, @u32=0x2}, @nested={0x4, 0x91}]}, 0xa8}, {&(0x7f0000000700)={0xe0, 0x3d, 0x2, 0x70bd26, 0x25dfdbfc, "", [@generic="dde30d143ea2278d67fbeecd3cbcadd4c96c2decb3b5024b38057d1a2993fae44a5aaae85153e54a99ac6a85c46e484f14193bb8b58be70204aab33a3d9dff3c9e705e058c1cb6868645007cd6f9599b6e9f34aa94d01a610916b22c5d6fb48595ae1d51f49dd7e3d23e7963d8fe75e9dc076d5cdfb20cae8b65c000f61ecfa91442fb3925cf4470c858bf963c34edd90e87785805bd0568dadbe149e4b9ee079c5e11d6f84ab97c715da243950a4e54b1af6d8d078792d2a2f2d79753087cacc6a1d9c993ce10df5df5c309e6"]}, 0xe0}, {&(0x7f0000000880)={0x60, 0x3a, 0x700, 0x70bd2b, 0x25dfdbff, "", [@nested={0x50, 0x34, [@typed={0x8, 0x1f, @u32=0x1}, @typed={0x8, 0x96, @uid=r2}, @generic="ad7c82f36eaf2d568226fe5b3aa80f1f65146793f0c83f483b92e8106e6028db2b1baf6d37855c348029136827bd33ee58410aecdd5ef50469597c14"]}]}, 0x60}, {&(0x7f0000000900)={0x3ec, 0x20, 0x800, 0x70bd2c, 0x0, "", [@nested={0x1c, 0x87, [@typed={0x18, 0x62, @str='cpusetem1selinux\x00'}]}, @generic="cb9acd6d5acd714957008226e0e0735ad04f01a7fc4b9956a4a598730806dd448b73291b5c77641c962e9734bc1658ed1cd1e522071a7abd5daa7ce20f45749c8d6e42999d378a4728d2f8a305ad970805c2927df3b47d", @generic="c0e3d5f39e61a01dc2b012c61138de6b4afb411b05b7a20e32c3bc012ad757b56247608de0b5dd0ed50aa67c3150ba0a0d10788053ecc6692ee98095d077bafb52", @nested={0x2c8, 0x7e, [@generic="e08f586ef3dbf6e75a21391a1fd9f817eb73c56c2ff237aa7ef45323d19ed8c9c06b09420b80097be8473e272d033d5a726b0624c313ac5f9c0dedb347ab3fcd8daa76cd7a38441453e64366db0e74b8705cb5c50f6c0dca6502cbc11f4addc3fd569edc0d7616788171d3a1932609c96da5f3ecd19d88eaf625872ebeb62c91fab7a799436f57da4557a863719f04387ed27876e0a4e3487b18ed12efb4cb1b5d75f68279c152d89d3433c9a33073acbf029f2d8ffd0ce0887952ea7c81848f128f005b8c7960475141a535281005", @generic="c6e6f2dccde30edd4ff617ae7083a304a1ea837226bd82a3bec4598fb5b444ccf6f997ddd4957ae74cd0fdd6047fde90ebe049ef73186dabe0cdb92ec8dcbcf17a9e5acbb3cc3a24ceae1b6de68b77be66d9d7e1e8ad6af8d5eb6f73c0f4ac6e65729c2e0e571a24f4baa92071ec87c8ee2d221f4d556fbc72011bdb9c080c", @generic="b58aa6a43c2e125e16", @typed={0x14, 0x4f, @ipv6=@dev={0xfe, 0x80, [], 0x15}}, @generic="5921646fe86be2290a242c47e3deb3044ef93418bd81d9388841e92d1f75defa92be16d497e7c36e8815f624368e56fd81a65e31da009a38b31542c3b4ad66b7126bfdc42f69ce0137fefde4f61603225370dd7f3a59c8539278cc1ee6b73598cf947f3d8bdcb4cf50848769e00bad5d1baff326d12bae34181ec9ea4000ae1dcc93b89b5a0f12015df7c63ffb6c9eee9d9d8a6b9e80a9df4df08a82a841d2abc41fe2117a0dc8a27eccf5da159b5cc4999be7b884dd320071d86f1163ce74c920386ec8624707aaf616eff2456779728214af6144e08d23a42ab6416342c440b604410581eac2d4a0b0aa7d986444d9e4ab7201c67549", @typed={0x8, 0x37, @ipv4=@local}, @typed={0x8, 0x62, @fd=r0}, @typed={0x8, 0x87, @fd=r0}, @generic="7f9eb3ea027717fb59d125aa3521e3c80f77d896425932d7d26abbdb4e9e7dfdce6780eb5465698e70c434a5c2ba8291d83f19528a742e29e37e35030a622740c76a8ae903d4bf"]}, @nested={0x58, 0x38, [@typed={0x14, 0x4d, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @typed={0x8, 0x69, @fd=r0}, @generic="8328df1f6c56d08ed9b531d0a385419a992eeca97d13e4f06b2660d1809d11a99d5e25256634522043f1b283916a59db814fa1677ff596"]}, @typed={0x8, 0x3c, @u32=0x6}]}, 0x3ec}, {&(0x7f0000001380)={0x14ec, 0x24, 0x200, 0x70bd25, 0x25dfdbfd, "", [@generic="698d66", @typed={0x8, 0x22, @u32=0x1}, @nested={0x2f0, 0x93, [@generic="e6a06c9982560d34e1f986bab771ace23c309e340767a11725966550c88d98ac50fc80d01c4dbf9ff8e4d97c0f99cd3a64e8c3f8e40b5cca2dddfc596f", @typed={0xe0, 0x1e, @binary="4ae3969299ccea182d14865487aa493dee51cef4f418557ffa10c8f3ed2a3db388e3371ffb06ac58a2c93c657af395925603346030d26fd9f7f1b32ba8eed3c7ee9693dce39cc09f8f10b42eb4999c45bced9eca29b76cad44fe9e2def675447426cf3a463f21106ef94763aed717606399dfe948d50204508ec6878cc9c13c422858bf5e250017f226957ffebc5a05c2afeaedac249aaf270fd7c852a52d7a4fae72d123c97bc79043649f843a201cbd79c3a8c51fc8a5896953c0e30fea6649ed4205b8220d5113f34fc8f5edeeacf80b7f6a9e8ff97fecf"}, @generic="df97492be1ce2ad76bd1b2506d4d00a6fd6980929984a356db4284e2ff727448f466bf1d689c3d000e19c18ebc5e329b91755487a5c24633de50f37c285a5c05f23b954bb4064c27c519c28aa0ded8d76bc5c1800dbbba0a89b7e1faf71fc60accfbdfe9f7c092a5246577319379838c6bc2415d3b1cbf765a199fca01b7517b993e839f1a7ccaf99ece79f4344fbda9f4c5f5a4c04a936169f826512d5eea344029cbf8943b9cf703cc105ee3f2d0a29f2cd397ec01a5f74cb2deda35533afa852d60398b17a72beea73a1618d0cffc223cfb74021f0d94478eb7006bb7b9da639c7e831b7904", @generic="d05da24577982146035f5cda1b164cef41e17178dfc6c31d1a4be1d00ea1d33190488ac92f107db1e66c3911f847871c336acd70b68d0d6c7b84313e1c1a0300d8a8479e910f20e53b74055556fb8d18aeff755dcacc1de78388689f4900eb50fcd5b959f8910c5adcac714a6c9cef53b16fda9d5ea9f4b9846078f195361a23841b5fdfe2bfefd858a916d5bceb143cf42ac05923511ead9b8b41d1ae59424432cddf880bd926e27c71f1e871be12f44d7404fc43aad332797d87f7698f681551c81a69c36428d5bb22fbc89bcdc972a60750971d789072f4c12d7fdd88930c516eebe982ef93"]}, @nested={0x11e0, 0x5e, [@typed={0x8, 0x4f, @ipv4=@broadcast}, @typed={0x8, 0x80, @ipv4=@multicast1}, @generic="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", @generic="88566cd197360b44a98e0811a8fc882b34cbf09affe8372b83fd686aa69ac9a92f19649825fd27b1680268fb4e874c4314f898d2f1455a2729066e2effabb2a3dc2478b4dc04c3024341bb4fe53ecfc2d63b63468fbee02a91ec85f1f01f8b00d0378d14e0db677bdfd09252ff8ed5f4dbab97f749fe94cacf2c29ed06d15eb4315fffaa2d936de450ff7669577b6dd42ed1be9ef8626ad4685c2db77a8bedcb309e0611e2a985ab6e2d7c9f7f85c3dee4e13ca55c266fec45775d170a11954b1f726f018665a8e8461c94065c836171213da2d79fada609f65d4a8625fb", @typed={0x8, 0x7b, @ipv4=@remote}, @generic="a671745f0ea431e269264f882d20401761ea2b0f5273571374c34f6fffb5234b7ad3c96c69c298f85aa650bba3b03b3c963b319b7fdfaf5f56ca48730b8238f2c63298e80ab00e2f5de5183f254450fcdfa450c45a683edb0e59591167d9f89ce99e90ac30f60b1c839e82b663b43c6053eec87a5ff038620014f76bf747143bbec3288bad66f0e3e228c1a2f15e212d16edf26895eadcacb25d9048a17a8025a817f9ba145b54a8f608aadd22ba4d9922881c4426de861205e531b1a2bb9d29f0accf6e8c676cc65aa111ce0449b1bbc299b970f49a79bf1933293c1b3522ecc394391428e1"]}]}, 0x14ec}, {&(0x7f0000000d40)={0x254, 0x34, 0x0, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x8, 0x7b, @u32=0x1f}, @typed={0x8, 0x29, @ipv4=@local}, @nested={0x1b0, 0x5f, [@typed={0xf4, 0x1d, @binary="63be70f4d25dc6541feb20060a59a3994a65bff0361cec050fb89fe8668513d589df8f83e678b38d3b557cac5ce722d84406bbc2751d8bb62bd9f7cceb4bb49941078e2b8bb94c78ee1ad58dfa0d424571fceb50a694bb29fd00fd2e967b447da6645df135dd80557c0825e8545a61892864753eabaae3757fa4a2eb6fcb81ef53a7c3ab5df180cc5dd30c6ee065fb09e908c7ec07fd19ea5995a412db34a7221ae1cb5b6f5c9ff9db3a7d7949e319430dc1288f64cf4610b76331be06eb614cd9c96698c859406c0e9c7b3f842c517386559d81d5abf33350c3509ef503b2ae84a56c12a027fa0b49e2de20d8f9"}, @generic="56ce9568566e739833daa66b393e7e2e409141247dfc0e458b2d092afae89af4c042d165f39b682cbe98c70f01b7ed206f613b28c67ffa3c6861a3d1536bb946fd3e9e28175b1cb38adeaacd9dfe84c370150e35cd30007a7a49f7810f962e6d0b73f8ed24b1a71e3ed6793e3649d980a3976b2f55f312f4457408b0cf6d0ab03e4c67a1440cdd3a94474a2da45741", @generic="cfa7ea85f2ced9b60ac467676a8de354f4a1690d036bdf8970221cc54ef8b18227dc405f1aff5000"]}, @typed={0xc, 0x60, @u64=0x7}, @generic="d86b103031002abe79417cf86e47abd33887100a64d3847af31d023775b97a9df9d1c674fba39ac35f5bbef9188274f359922ca35a5414f87a0ced54ad5bb0e26a8ab4929049c7c230e21687a6c16ff5dc8d2501136855b92292e26bf6172a095b2617e6bc09c0bff3daa565565fdf", @typed={0x8, 0x5c, @pid=r3}]}, 0x254}, {&(0x7f0000002880)={0x1280, 0x31, 0x53c, 0x70bd26, 0x25dfdbfe, "", [@generic="e1d3e1d0933e4093ce871c5b02ca932edb8ec3a4f7ea3fc233e054d14833b741a4314f7d9b47e93a9eec33a0b1cbc6a5a2557801a9711c0fdfaeeee1fc1d416d847d656236", @generic="28bb", @typed={0x8, 0x1f, @u32=0x3}, @nested={0x14, 0x29, [@typed={0x8, 0x7c, @u32}, @typed={0x8, 0x8e, @fd=r0}]}, @generic="81285a02f4dbaf7cc38fa1", @generic="178ebc94502801b5468426b083551906c88f2ad4fac683cdc254b8d82c9276f3cdead88076e03edaffcb79001d1363fef1087256ae36ac999e3c598a966be70df628a7fdd436", @typed={0x3c, 0x6f, @binary="47610df76fe51641d399d1aef00698d1a466ab91740baf6ce47594af6ef295e357c0f6e5e6f7ac22f2bb2eaf6539f11da58f2b0755e28ace"}, @generic="7cbb950716976b2c37ff2ef97cebf428ddea4b3b7185d211610e4230d3400b5df8706b1c331b2b15be27b1eca76eb4e415fd045f96003af4baabbac63fe3d9e24e327eaeaa5da28f052f6685a81e5417abd6e76420ee51d092b2d6217b23b1bd75e6c0ee4f85d4531bf88305240446061c204b7976553f95f14a77c743d360feea6ce1209345678f58ee4097679b89f2a073e2959a27656d99ac65d6b3fec27f", @nested={0x10e0, 0x59, [@typed={0x8, 0xb, @uid=r4}, @typed={0x14, 0x5e, @ipv6=@loopback}, @generic="e6e5a312f062f99aa9d11d6194ded31c1f7866d6a06d0130b17f4dca4ed200d501d96eea00400c0e93defc7ceea23fde5673056f5f25e6b16d9d3647f714e89487456f01197d4a723c7f047cd90749576e4270dce3d2fcf764d7ae55d291447c51fcf7e71282aeafe6934bb4", @generic="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", @typed={0x4}, @generic="c2d0022bd0bf23066cef03df0c8f91523cf181d622269202834bb79b98dc72617df3c3a709d05d432b889bb7fdc9be2ce3cb772f969f760b71b2ef01bd4debd29de8e8dec3906c6c1119bc26bdc1161c"]}]}, 0x1280}], 0x8, 0x0, 0x0, 0x40000c1}, 0x8080) 03:41:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700008a00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009a00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x200000) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x19) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:39 executing program 2: getitimer(0x0, &(0x7f0000000000)={{0x0, 0x0}, {0x0, 0x0}}) r4 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r4, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r5, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r5, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r5, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000001700)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=r2, @ANYBLOB="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", @ANYRES64=r1], @ANYRES16=r5, @ANYRES32=r5, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESOCT=r3, @ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX, @ANYRES32=r1], @ANYRES32, @ANYRESOCT=r2, @ANYPTR64, @ANYRESDEC], @ANYBLOB="f7db3cf2fac846e86e8bc719ca9d2866d3fe5587f94f469d623e1ba10a8ae130ed8ac2cf8d6e891d1209ed5f49187a6ca07e457a81dba712dafc39303c2d8700a45363b48266cd44aa77f925bd4e8206194a462676", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES16, @ANYBLOB="5df3a86695d4e64f71e2d50226cfbd1822a9", @ANYRES64=r0, @ANYRES64=r0], @ANYRESOCT=r3, @ANYRESDEC=r4], 0xc6d) accept4$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r6}) fsetxattr$trusted_overlay_opaque(r5, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000040), 0x4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r7, 0x5425, 0x0) ioctl(r7, 0x9, &(0x7f0000000180)="45625fe350ab548f8be372599ff685f5d94d131f051548aace") write$binfmt_elf64(r5, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@ipv4, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@local, @remote, @dev={0xfe, 0x80, [], 0x19}, 0x9, 0x6, 0x100000000, 0x500, 0x9, 0x10000, r1}) ioctl$sock_ifreq(r0, 0x89f6, &(0x7f0000000080)={"7465616d5f73c44776655f3100", @ifru_flags}) 03:41:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x400200) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000040)={0x100, "3d4a6dc7052aca6232e6c8a24c26c91f9685dfc968c04e48fcac0c22ea28aa2c", 0x1, 0x4, 0xd0b, 0x4000, 0x4}) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000001c0)={0x3, &(0x7f00000000c0)=[{0x1, 0x2, 0x99d, 0x2}, {0x7, 0xa1c2, 0x30a, 0x5}, {0x1000, 0x9, 0x40}]}, 0x8) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000240)={0xbc, 0x59455247, 0x1, @discrete={0x4, 0x6}}) bind$bt_rfcomm(r1, &(0x7f0000000200)={0x1f, {0x541f, 0x80, 0xffffffff7fffffff, 0x7ff, 0xc6, 0x1ff}, 0x908}, 0xa) 03:41:40 executing program 5: r0 = perf_event_open(&(0x7f0000002ac0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b1280000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) dup3(0xffffffffffffffff, r0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000340)="6e657481360000000000000000000006300c455140") r3 = socket$inet6(0xa, 0x1000001, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x6, @loopback}, 0x1c) listen(r3, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000002b80)) recvmmsg(r3, &(0x7f00000029c0)=[{{&(0x7f0000000140)=@ipx, 0x80, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/102, 0x66}, {&(0x7f0000000400)=""/212, 0xd4}], 0x2, &(0x7f0000000500)=""/68, 0x44, 0x9}, 0x12}, {{&(0x7f0000000600)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000680)=""/65, 0x41}, {&(0x7f0000000700)=""/208, 0xd0}, {&(0x7f0000000800)=""/150, 0x96}], 0x3, &(0x7f00000008c0)=""/37, 0x25, 0x200}, 0x80}, {{&(0x7f0000000900)=@hci, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000980)=""/148, 0x94}, {&(0x7f0000000a40)=""/235, 0xeb}, {&(0x7f0000000b40)=""/54, 0x36}, {&(0x7f0000000b80)=""/153, 0x99}, {&(0x7f0000000c40)=""/24, 0x18}, {&(0x7f0000000c80)=""/48, 0x30}, {&(0x7f0000000cc0)=""/78, 0x4e}, {&(0x7f0000000d40)=""/107, 0x6b}, {&(0x7f0000000dc0)=""/73, 0x49}], 0x9, &(0x7f0000000ec0)=""/4096, 0x1000, 0x3}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000001ec0)=""/108, 0x6c}, {&(0x7f0000001f40)=""/160, 0xa0}, {&(0x7f0000002000)=""/161, 0xa1}, {&(0x7f00000020c0)=""/152, 0x98}, {&(0x7f0000002180)=""/68, 0x44}, {&(0x7f0000002200)=""/82, 0x52}], 0x6, 0x0, 0x0, 0x7fffffff}, 0x3}, {{&(0x7f00000022c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002900)=[{&(0x7f0000002340)=""/249, 0xf9}, {&(0x7f0000002440)=""/116, 0x74}, {&(0x7f00000024c0)=""/218, 0xda}, {&(0x7f00000025c0)=""/201, 0xc9}, {&(0x7f00000026c0)=""/92, 0x5c}, {&(0x7f0000002740)=""/92, 0x5c}, {&(0x7f00000027c0)=""/112, 0x70}, {&(0x7f0000002840)=""/168, 0xa8}], 0x8, &(0x7f0000002940)=""/112, 0x70, 0xffffffff}, 0x8000000000000}], 0x5, 0x10020, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000002a80)={@loopback, 0x44, r5}) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000002b40)=0x80000000) r6 = accept4(r3, 0x0, &(0x7f0000000040), 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2d0000000600000000000000000000000400000000000000060900000000000004000000000000005d5b7b5d00"], 0x2d) setsockopt$inet6_opts(r4, 0x29, 0x0, &(0x7f00000000c0)=ANY=[], 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2, 0x8dffffff}, 0xfffc}}, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000580)={0x0, 0xffffffff, 0xffffffffffffffff, 0x5, 0x9}, &(0x7f00000005c0)=0x14) 03:41:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000cd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/66, &(0x7f0000000040)=0x42) 03:41:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000800000000000200012001000010069703665727370616e0000000c00020030000000e702004db9f247b1d86dfbdabf2dcad864f732b5b260977451d936f34093f1c32d24518f4618fc7c00000000167efafe7ab9a0276e27a727fe03"], 0x40}}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x80001) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) 03:41:40 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000000c0), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) signalfd4(r4, &(0x7f0000000040)={0x800}, 0x8, 0x800) 03:41:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ea00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 842.316644] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:40 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x100) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ba00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x893f, &(0x7f0000000040)={'ifb0\x00', @ifru_flags=0x400}) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8d34dc38606ba0cf, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:40 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000005, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'ip6tnl0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x101000, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000003c0)=[0x7, 0xffb]) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x5) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000007c0)=ANY=[@ANYBLOB="66696c746572000000000000771889410c16b1860000000000000000000000000000000000000000730000008d1c30a638f5e79d2051bd93ac6a10f940dee39e2a00fb08273c36c67f2fb295183f881e299cc93dcbc9c3b488ce3e604f0ff11c1e61464da021512081c813fe80b33edcd346160a901899a23dfbe6d7fcf058647b9511c361e9d96ab2c52ee1cb4c310bd9d05e75048183ce00d0b3d44b61a869306db12bb747f5647ceaf9645093cdce0b"], &(0x7f0000000180)=0x97) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) pipe(&(0x7f0000000140)) sendfile(r0, r0, 0x0, 0x8) 03:41:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x40) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000020012df0f00010069703676727370616e0000000c000200080002ff0f000900"], 0x40}}, 0x0) 03:41:40 executing program 5: r0 = socket$inet6(0x10, 0x800, 0x40000000000) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f0000000380)="5500000018007f5300fe01b2a4a280930a06000000a8430891000000390008003504100000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d400000000000000006de400000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) socketpair$inet(0x2, 0x800, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x5e, "edf74bbd87b49fd4aad786bffbe5a0375bb867c9df93cfd5a19d4a9ac32663ab685d27c34b03d43b5bad83e8804ff85bc581ea31a0a383f7622b4c7e4dc1126222fe20b05d03708d1e62a741a564a81e81d338658b39a1a0adb0df5539a5"}, &(0x7f0000000040)=0x82) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000200)='filter\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r2, 0x4) 03:41:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000cd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\f\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 1: r0 = socket(0x9, 0x80000, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0x5, 0x200, 0x1a9, 0x800}, 0x10) [ 842.680890] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:40 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x80000, 0xfffffffffffffffe) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x40004e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x1, 0x2100c0) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000180)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f00000000c0)=""/107) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x80000, 0x102000000) socket$inet(0x2, 0x6, 0x1) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffe, 0x801fc) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000140)=0xeb, &(0x7f0000000180)=0x1) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2000, 0x0) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000100)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000200)={0x7, 0x8, 0x127, 0x6, 0xfffffffffffffff8, 0x2, 0x9, 0x1fffffffe000, 0x7083, 0x57cc}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x10100) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x400282, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x100000001, r0, &(0x7f0000000100)="6e3c9a98", 0x4, 0xffff, 0x0, 0x1}, &(0x7f0000000180)) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0186415, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x92, &(0x7f0000ffe000/0x1000)=nil, 0x6}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4018641b, &(0x7f0000000280)={&(0x7f0000ffe000/0x1000)=nil, 0x62, 0x5, 0x40, &(0x7f0000ffd000/0x3000)=nil, 0x6}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80585414, &(0x7f00000002c0)=""/245) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) quotactl(0x2, &(0x7f00000003c0)='./file0\x00', r4, &(0x7f0000000540)) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000580), 0x4) getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000005c0)=""/205, &(0x7f00000006c0)=0xcd) vmsplice(r1, &(0x7f0000001700)=[{&(0x7f0000000700)="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", 0x1000}], 0x1, 0x1) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000001740)=0x7) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000001780)=0x5) connect$netlink(r1, &(0x7f00000017c0)=@kern={0x10, 0x0, 0x0, 0x3000}, 0xc) fsetxattr$security_evm(r0, &(0x7f0000001800)='security.evm\x00', &(0x7f0000001840)=@sha1={0x1, "01998a6b290e58265b6d09c117444217161eca77"}, 0x15, 0x1) ioctl$FS_IOC_RESVSP(r2, 0x402c5828, &(0x7f0000001880)={0x0, 0x7, 0x2, 0x141}) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f00000018c0)) sendmmsg(r1, &(0x7f0000003f00)=[{{&(0x7f0000001900)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24}, 0x0, 0x3, 0x2, 0x4}}, 0x80, &(0x7f0000003b80)=[{&(0x7f0000001980)="09c1238e5db115c4be92ed0096fe38d34f41866df29995d29d4c532b8d1e7affdfcb6c53aa8b16a46b0990c4104f72f2d70fdf4e47d145dba149eb40036d9ff0aa115016d81ef19de0b5a6a8c0", 0x4d}, {&(0x7f0000001a00)="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", 0x1000}, {&(0x7f0000002a00)="94162b691f8e98854a447e61cc6dbf6a70d9df672b328ea1da79a326590a81974d77185efd223807c17d79844df0d25804e6f70db6bb3e3896bf555021b66b545dd845d76e15a0fe3f4b12e1948cf25c5066925a75464e0ec49480b4c6a0d4919cdf61ac18cae21206b81227bc21a0f04e2c76ab4ea9595fe949678218c11943d42f02b081ffd36e2ac72faca8e7fd2867a729f1a8056eca1cb0", 0x9a}, {&(0x7f0000002ac0)="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", 0x1000}, {&(0x7f0000003ac0)="92acc5cf91613d555071cb9873146e2efc30c752122f355930e6680dfb2ef847de9cf4b26960fcd9930c27f8b244f9b2b29936b88c1880e2053361859a98532166911580a6bf66b58405aa1babbef066f7dcfee50c3c07428cd0ab3ca6bd04ae921091f226eb14d1ae2e0228b514a0760c242a5d593a978f03fe768b55f127c632dbbdc70f8678d2e7b1c20ef7d9a5", 0x8f}], 0x5, &(0x7f0000003bc0)=[{0x70, 0x109, 0x1, "be4cc061f7fb86021d531e1e5b5031ceb3afc46fafbe7dd9842eaadef1568f703c1c050a77d6f8d3a721a556133d97009aa84a9d13d66c69d5a692d4be915ca29709ee31d981238fc35ee417a6ee88106970088c320f5f4d2002b9792aed26256f99"}, {0xcc, 0x10f, 0x200000000, "ffb58263de78bacfc30e4c0b0bc14e6356461a38a3af42c9e0027e32075153ece666e8640d1891687987ccbd23bd2d7f2e390407caf973208f07e5b725ee2428eee458b130592a3de9ffacb4bb8cbc89374d5ff5b9995675ea9d57e395c54fb38c1d5356c81cf3e6567cfb4b5ad43f95235be21981166eaacaf801c14bffb5b3ac89709664c0bfaad32adcb1038f58b3a7596e8776f6383f9d5a636ac8c7e1b6440395646ce7a8c531bf52903fd3da3184646ae4d288b7a436f59b500457e262"}, {0x58, 0x119, 0x6, "f55257471468f28b484d5627bb63b14680b28e99ea13f6b254f03824fef7c4f4c02a6799009b62103d655b0d6db51b4289277011f7ada99ff78e30d4f1a396f348416533d010d50c8abfa881"}, {0xd0, 0x115, 0x81, "a914294b7ee1c8f5c07290fb41a46e8b0cfb2060e2ff41a78aebc59f87d9aeecd7f9325fe9c3b7474f111fffcf2a9da6d86273eb5ef628bb9f2655fd258725309da57b5b2580eb69a51ff688c9fed24ae2846432f3bccf5d4653558f5782ccf1da1d0d94b2b7cefbc24adb06f5ad84504bffaad7277941656a39df61b6adab047198c0666375db447ba59def3a7304877449b22774fdd9cfb0469000bf41fb8f4524da7608fde611dfce859e4e7ae3375478e4edbc8c660739c5c73a090a235fcc31b3"}, {0xd4, 0xff, 0x0, "4a465876b4ff15512f1f85fae147de49c3e9316916c001d40bcbea8fa07133056268861de5bcfd98a7aaea773d14ed977870681070b4d55cbc58594554d44aef648ea2b35ab2035b25000557b91f57a7a22f2d7ef47d03ad92f25f8ec88ca53ec97400d35c7099d82c56c7635dadbf5adaa1eb9d5b5ac6516319c5eccaeb3161be74eb7b76b8dd1f0a6849cc6b2351fed91deab9b0cbe8724a842548e41310784c8401fb2bde24d78d26d75e02a80201f519d57235a3b1db3052b72a6517ee9bed7336e252d08e"}], 0x338, 0x4000000}, 0x6}], 0x1, 0x4) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000003f40)={0x0, 0x3, @start={0xe3}}) recvmmsg(r1, &(0x7f0000008480)=[{{&(0x7f0000003fc0)=@can, 0x80, &(0x7f0000004580)=[{&(0x7f0000004040)=""/203, 0xcb}, {&(0x7f0000004140)=""/184, 0xb8}, {&(0x7f0000004200)=""/199, 0xc7}, {&(0x7f0000004300)=""/198, 0xc6}, {&(0x7f0000004400)=""/111, 0x6f}, {&(0x7f0000004480)=""/252, 0xfc}], 0x6, &(0x7f00000045c0)=""/100, 0x64, 0x1ff}, 0x4e45}, {{&(0x7f0000004640)=@rc, 0x80, &(0x7f00000058c0)=[{&(0x7f00000046c0)=""/133, 0x85}, {&(0x7f0000004780)=""/55, 0x37}, {&(0x7f00000047c0)=""/203, 0xcb}, {&(0x7f00000048c0)=""/4096, 0x1000}], 0x4, &(0x7f0000005900)=""/159, 0x9f, 0x1}, 0xfff}, {{0x0, 0x0, &(0x7f0000005ec0)=[{&(0x7f00000059c0)=""/32, 0x20}, {&(0x7f0000005a00)=""/197, 0xc5}, {&(0x7f0000005b00)=""/228, 0xe4}, {&(0x7f0000005c00)=""/133, 0x85}, {&(0x7f0000005cc0)=""/74, 0x4a}, {&(0x7f0000005d40)=""/90, 0x5a}, {&(0x7f0000005dc0)=""/249, 0xf9}], 0x7, &(0x7f0000005f00)=""/240, 0xf0, 0x6}, 0x2fd}, {{&(0x7f0000006000)=@sco, 0x80, &(0x7f00000060c0)=[{&(0x7f0000006080)=""/29, 0x1d}], 0x1, &(0x7f0000006100)=""/161, 0xa1, 0x3}, 0x2}, {{&(0x7f00000061c0)=@ll, 0x80, &(0x7f0000008440)=[{&(0x7f0000006240)=""/4096, 0x1000}, {&(0x7f0000007240)=""/164, 0xa4}, {&(0x7f0000007300)=""/46, 0x2e}, {&(0x7f0000007340)=""/55, 0x37}, {&(0x7f0000007380)=""/160, 0xa0}, {&(0x7f0000007440)=""/4096, 0x1000}], 0x6, 0x0, 0x0, 0x4b8}, 0x100000000}], 0x5, 0x0, &(0x7f0000008540)) unlink(&(0x7f0000008580)='./file0\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r5 = accept4(r1, &(0x7f00000085c0)=@nfc_llcp, &(0x7f0000008640)=0x80, 0x800) write$FUSE_INTERRUPT(r1, &(0x7f0000008680)={0x10, 0x0, 0x8}, 0x10) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f00000086c0)={0x7f, @dev={0xac, 0x14, 0x14, 0x19}, 0x4e23, 0x1, 'ovf\x00', 0xc, 0xf3e, 0x48}, 0x2c) 03:41:40 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa08) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000000380)={0x2, 0x1000004e23, @rand_addr=0x8}, 0x8) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000480)={0x0, 0xc000000}, &(0x7f0000000500)=0x8) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000007c0)={r3, @in6={{0xa, 0x4e20, 0x71, @dev={0xfe, 0x80, [], 0x1a}, 0xffffffff}}, 0x4, 0x8b, 0x1, 0x2b3, 0x3f}, &(0x7f0000000540)=0x98) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f0000000100)={0x10000, 0x1, 0xfff, 0x6, 0x1, 0x7}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000400)={'dummy0\x00', r4}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) llistxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000900)=""/139, 0x8b) uname(&(0x7f00000009c0)=""/131) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) write$P9_RFLUSH(r6, &(0x7f0000000180)={0x7, 0x6d, 0x1}, 0x7) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0xfffffffffffffd73, &(0x7f0000000600), 0x1, &(0x7f0000000200)=""/20, 0x14, 0xff7ffffffffffffe}, 0x100) 03:41:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\f\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:40 executing program 1: r0 = socket(0x10, 0x3, 0x800) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:40 executing program 3: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', r1}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) write$P9_RREAD(r2, &(0x7f0000000080)={0x1f, 0x75, 0x1, {0x14, "c83b32936ab43ee5519407316f0a07429191a677"}}, 0x1f) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:40 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x200800, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x8001005, 0x1, 0x3}) arch_prctl(0x200001000, &(0x7f0000000140)="0000000000000000000000f3428f00") openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x80000, 0x0) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x4, 0x0) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x200200) write$P9_RWRITE(r0, &(0x7f0000000380)={0xb, 0x77, 0x1}, 0xb) syncfs(r0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000000)={0x9, @sliced}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000240)={0x8001003, 0x7b, 0x2}) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000340)='TRUE', 0x4, 0x2) 03:41:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000bc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89d3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) 03:41:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000380)) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r4, 0x4018aee2, &(0x7f0000000100)={0x0, 0x85b9, 0x7, &(0x7f00000000c0)=0x4}) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000140)={0x1, 0x5, 0x100d}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x15b) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000980)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_buf(r2, 0x0, 0x30, &(0x7f00000009c0)=""/98, &(0x7f0000000a40)=0x62) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x3}) r3 = dup3(r0, r1, 0x80000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000180)={0x8000, 0x8000, 0x2023, 0x0, 0x4a}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={r4, @in6={{0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0x15}, 0x20}}, [0x3, 0xffff, 0x0, 0x1, 0x5, 0x800, 0x3, 0x7, 0x3, 0x81, 0x2, 0x1f, 0x1f, 0x2, 0x9]}, &(0x7f00000000c0)=0x100) 03:41:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000bf00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 1: r0 = socket(0x10, 0x0, 0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 03:41:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000000)={0x77359400}, 0x8) 03:41:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) poll(&(0x7f0000000000)=[{r0, 0x240}, {r2}, {r2, 0x1020}, {r0, 0x167fe3a0412459fe}, {r0, 0x9}, {r0, 0x2204}], 0x6, 0x9) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000300)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) 03:41:41 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0xe) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x1, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x200, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x2401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, &(0x7f0000000100)={{0x1f, 0x3ff, 0x10000, 0x4, 0x5, 0x58}, 0x80}) io_setup(0x6e1, &(0x7f0000000140)=0x0) io_getevents(r5, 0xffff, 0x6, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000180)={0x77359400}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r4, 0xc034564b, &(0x7f0000000440)={0x8001, 0x49433553, 0x268, 0x5, 0x0, @discrete={0x5, 0x9}}) 03:41:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000e800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc000, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x40, 0x1}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 843.661074] validate_nla: 15 callbacks suppressed [ 843.661084] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 843.722085] *** Guest State *** [ 843.737303] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 843.745666] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 03:41:41 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socketpair(0x10, 0x6, 0xfff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000080)={0x9, 0x8}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x101200, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) [ 843.765223] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 843.777623] CR3 = 0x0000000000000000 [ 843.782941] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 843.790825] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 843.797983] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 03:41:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700001000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 1: r0 = eventfd(0x100) fchdir(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000000)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@mcast1, @dev={0xfe, 0x80, [], 0x18}, @local, 0x9, 0x6, 0x3d, 0x500, 0xfffffffffffffffd, 0x10000, r2}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x10b040, 0x0) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000200)=""/153) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f00000002c0)) fcntl$setpipe(r4, 0x407, 0x1) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f0000000440)={&(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x4, 0x5, 0x1, 0x3}) readlinkat(r4, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=""/4096, 0x1000) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f00000014c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, r4, 0x0, 0x8, &(0x7f0000001540)='wlan0\')\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000015c0)=r7, 0x4) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001600)='/dev/sequencer\x00', 0x400, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r8, 0xc0185649, &(0x7f00000016c0)={0x0, 0x7, 0x80, [], &(0x7f0000001680)={0x98091d, 0x4, [], @string=&(0x7f0000001640)=0x10000}}) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000001700)={0x1, 0x7}, 0x2) sendmsg$nl_xfrm(r8, &(0x7f0000001ac0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a80)={&(0x7f0000001780)=@getpolicy={0x2e4, 0x15, 0x10, 0x70bd2a, 0x25dfdbfd, {{@in=@dev={0xac, 0x14, 0x14, 0x18}, @in=@remote, 0x4e20, 0x2, 0x4e23, 0x73ad, 0xa, 0x20, 0x20, 0x62, r2, r3}, 0x6e6bb1, 0x2}, [@algo_auth={0x108, 0x1, {{'sha512-avx\x00'}, 0x5e8, "ce7131166516ee04acd94a84066696580f16614af7118e81c928b3ec7f793330d45ed5129de9e4ef65f03d5802a5327a0354223e4cc670d0bce3c254b9ce91cd7d21a4110cf621ba85a5062804f9fa5e781043b6f125ba82155bec5120245c12b7347a0771e92ac052469f0db84de92df78e955e87e6a0a014bfa26bb0e566b7ea0016cb2fe2a6df6bf8b5fb0c66ed6f3041742f4574f67edb513b6ef36221c5eec3ad5e04cefa28124c221187347ce0762274291574f8f3fa000ee6e6"}}, @tmpl={0x184, 0x5, [{{@in=@multicast1, 0x4d5, 0x33}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x14}, 0x3502, 0x1, 0x1, 0x1, 0x9b6, 0x20, 0x3ff}, {{@in6=@dev={0xfe, 0x80, [], 0x1b}, 0x4d5, 0xff}, 0x2, @in6=@mcast1, 0x0, 0x3, 0x3, 0x1, 0x3f, 0x2411, 0x80000001}, {{@in=@broadcast, 0x4d3}, 0xa, @in6=@dev={0xfe, 0x80, [], 0xe}, 0x3505, 0x2, 0x2, 0x0, 0x7, 0x5, 0x80000000}, {{@in6=@local, 0x4d2, 0x33}, 0xa, @in6=@local, 0x3506, 0x1, 0x3, 0x2, 0x515, 0x1, 0x1}, {{@in=@rand_addr=0x8001, 0x4d5, 0x3f}, 0x0, @in6=@local, 0x3501, 0x3, 0x0, 0x1, 0x7, 0x6d9b8551, 0x40000}, {{@in6=@mcast2, 0x4d5, 0x33}, 0x2, @in6=@mcast1, 0x3507, 0x2, 0x1, 0x7f, 0xa2, 0x1f, 0x7}]}, @replay_thresh={0x8, 0xb, 0x7}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000001b40)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001b00)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000001b80)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @loopback, 0x6}, r9}}, 0x30) lsetxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)='trusted.overlay.upper\x00', &(0x7f0000001c40)={0x0, 0xfb, 0x1015, 0x2, 0x3ff, "08ed5b74ecf866ac710fea0fb81ffcb4", "d2b689e4c5626ff79e51cefbd6e45a60247cc9d0fbcd9abea78a656a82b52ebb5f3c57c0b40f0314060618bccac9941e89c658e144a97fb7c073de3643da71f6cc3518489068e5f6f15f57a3252beb5c5895b705fe19dbee868505c53156adc0338aada1c7ccf8bef6cbdae534209c991cc527c3846354bf200b4bd39ef531607731af4bad0ee39cdd5d3f4984ab7a6b401714f0b221ebb625845a32583b9d622cd7ce62de0a01c30e7b0f264027f8878da47ee61d0f1b7be45c2d3a3f23b34d749e766560284d5f30e60bdd4150441f395f9e8e28e01b832c54e4d2b6922ed7b6d8debf6cdbb64fad917f41c8f351eea86494d5fa4e30268d36723148e59bfd0e84722d47ba54ce7c22742510f834adff89765636ffe9a6af12e562920bc66107e20078f60e2d8f3facbb12de948a99804bc4e1f3cc345772a930eab4756f17e4c7abeff867416d4b835cdba54ba4b696853b2870e9f97f770308446ff0f1e03f89f170e01a55b56d8a50d1f3d6eaba344e5f52ac27d7f270c5277437de791d7d088bf5f100b5d33a35893781e76362abc59905e481edbbbe04a2f4126cdafaae4d2333cb91c18ab6cbc9f869de34f2c08f110b3df7876b4524e07eb1d81e1bbc0fc095cc2a8077d4866568954f3f207bf29937714e6d6940d8b8510284c1eb3015b52ae50425fb2b8884d11a669398864a74b5fa1a4a1f26d6da0d016c1a90acb1d1b69cc0a4d57b62b7e51c0aa337e9413bf138bec1e8a9618d0a665fcac656662526887878c7df0db8f3f97e62e7b4741054e500e3e03e8e43ba3c734b70113c5a07f1ccec81afc846b834bc63ca8cd1c0119c6a762c7d04a2599048ce766c206a008be0e098d145fede28c950155d085aec3e7ad8fd3fd2f5d286219249f78c0f1361af3bdef98981f23eccfc02e3d6e9d09e71b87546186ccc11f3dd2f98c30d2a6eca78de1a15a8c720fdc933906552214ca67f470fbb90fa4e169e687c6e30d9d735b67d362009159f4e713be1e4d344f820e9a1832059045dc6afb7512b3d464554ea4ac680223cfc7cef02024406674cd1ba4b7f86badc0cb8c8c06f54ad53c0fcde599a36fc1b34faf4a8352a98eec6b83c8932a89df609cf5818d560a79b1a851ef2cfb43fcf5bab7e0325f4f44d06a4fca41cc4e06f86285519c093347d309b509172bdcf0bae8e62f3d4a612545522f37ab822fa8e9ecfb9724efefe07cbf038f24ef129b251c4f6cdffe376a100748690aab6a890e9ef2a57f75e8150fa6b0a17aafbe5d36711ba1395bc6d03e09606ad8729733567ade3e1ca8fc6e237e0de04f8a3f41118b6a974b5d3ec7e136749efe1225a17b811dd08bc81d6323ba25cedd2608c83d138d1d3b6dbc1dc00af2827435e9441f3196bef436dd9c544adf424d70c57dbebc0295a7ceb3022c8330fa94f697534a9d7779d4f2678d2f90d5b7116497e24ba41aa8950815fea4b4767237d7bb4aef35215b1b7f5bf6419472f100f9711324648f0d30a6e9718ea87ee5fca870641531c96ae18db1fd9522c9f272da095fad619c1db6335482e977aba76674dcbd078c81e0ea4a55dae15faf86edc6f0817994106a2b389ef36c68dd9e254dcfb90121b8a4c332509ff19783c669e63aaa10f4bd7dfcc08b36651de4c48a6edb62147b282cc4fefc35fcfcd17b676cde2a7f2cb776fb28aa0624cae0c5c089bfc845ae62c16941fd4785ef4001a35e00182e008263b10166e14ad14a09bc0c73313a46382c85fc6ef238c3c8e21b0c450d30df01c4fc52c3d7736fc223a3c43d969cec9efc11e8a169eed40122abff7309531720a0802a247c57979556b2ca644cd3a59a927f8815b372001c59e43879054fc658df7958a39b88502e8b231699c6ef8f6ff42fe47b5dd6cd5d1b5dfedc402be421f99f31f436cab0d781faee77ca2b29eda30301188092b75d355ac6468ffcb6d7053383c94236652832a17796511e7f159dc035a2409bce480a89794ab563b901eb040277210a4151d592a7ed330ca646597730085e301a26fbf0675f964afa9a6577262441981c247cfd9715c8076ab3dc56db1916c5384a15a4d314d4d4850b42cfa0bc1d5ede585aad1dd71ea720b601e9992676880b72c4a97a59a9a245f761785cdc9d0b993ea154a23fab880f1d1e6de8b0f745815011bdd3055f11f783da4950b0929063730f44c190ee8a70f7ac78ad9d48367d56727cbb92a15050c2c6002b95e5ce7482908fdd8c8836d6754d1646e507d667926bfbf8844882f21517c2d2f697e117b7e211e55216dd936df6fbf6bf13c79067e8e692c0b37e45c282ab290fbd350939951d061125c52e01f2849f8a1ad6a966292c228acac5ad7c5634b9a720e90aa434b2f9dd5fe73d23e378b6001c43d433d4af9c078a9498b40c9cdbb2f1c5dbc18d70cd146722dceb74bfccf1059147931243fe188f5c17d4ef04e5de757fa2c67f63649c15f69d29ce851040ada4d294c230e7b7f80364aeb2d264cf8b947cc00d2374dc7e24da72bc606482d989ed14961e32dcaec83f76184707fee5b23647109b6dab5afd84c8fd2c46984681d065265d54e9ceff1cd4a8bdef8ed8198077027eefecccf7988d58c26f2dcea997569d9cc4dabd6748ab719fea1e6867a89b4630398f113511fe36f0743cd57be24a53d184feb52e0e43ee21107306ab6cf72aa35adfa46908d8420ab0ec81cd51531ddd861b60fc1e0d7b4b282b127b0524894fc5e97a4a25a19c3ab0078dee362602338f49f9441936c3256ceccacd2b563eb3276632b4824bc70da55c55b923112c53b75d111df9e22f08791f277ab97a3489ea5f36fe71b5a514a7366a33c7ad4fe8ae29ffdf08882dd0fc414aef06b8276a1e1ac49e59be25e2eab2ffa5bb68b074830b2778bf3fe9e284a62ae5ae5a123d23fae4198c1bdcf3502ec41e0c4bfbe3a0428fdff8c7889dd853e714ea3b1234246390ffa52ece41d46616d39c45208cd8999f12fef9f5a59efc3957d838bb4fdc7062cc7457195a50d153e9b7ba49294588a108b8fc3787b116dd48eef18f257273892615babc9bbe68b983f1df63d6460c2ff52bdee86d9096aaf64fe1d2eb5a1e4247715b13b23020017a1d712081c41e6c6c5f3d746f2157e8a5a62847e78596279cb21022c9d480b46b35044cc183eae4888704e6f01d62915ee2b82e3274ed124f2fec66be9293f5d0d0e2a66714a514d47ac7ea5ecbd82f74e7fc6049b60e113d02fbf0e3d118952f22eb57c371a8bf5d52565af1a5dc88db7748e98d88ea3e045433efb6d39a476288b09e0055b356fbfe7b10b2c1c5ae66d47baf608fc6491d09c74ca8ee7608c9b9ac6c09fc2c77059e67f133016ffa8393a978955946be6985ab6a5a387876166c7e56fe1c8b3892329cae114936838a30d855b6c4907625c1a6188e2ff798bdbe054ed41f416295face68ac1a96823a0b044e53c302f3c8727491479b6f40325ced8ea7c617758ae2e2fafdd0a897ba0553a15a00e5438e5a963de8ac06c3dae00a09cce63ac425d0a041334ceb2c11525fb797a12853fd60c91fa7dc9f2fe2b1f085b44de5d9204c9b379ee9a50f0af56a327c408eef3a760702aa5659c655aaea2fef83bf422a63d6116dc0abe5b07561ae8f39b45d31a92963f04dfb95abeca3aca0daaa0827e6834c68c60b0500eccd4a885f8cb1d8b1939fc7f93c09661424544d8a8fa54195379848fa39651f71e1168a24b0bac0c3b44adbe60105b5fc541e0ba080bf7da96f9dff00535e24708eab7af8f094c4ae1f8ffe400d548fd62cbc05f944607eed5a43e0e2171c82e8d0397347a03117c4c9003d02217a1e8f2b8126ed5225e2c2782a3033d4b7187b182d5b1828d3e9e1fc3d4bdf34825f645e7cf6d2a1fe0c7a921deeff795fa2cc6f3f7c306f50e9d09d3c0f9bf67f2de0c625fd93d12d8fcc4936a04e87956fc484ebefc2902d5a8b605d67ceeb2f2c7c25ebf68aacfb4e67ea7633f24eff6c8de2d1b575bb4c044a86aff5ee75071ab4b223326a1e3cd44680198152df5a78641ad6218dece928145d41df0ccbdbe5f393245f2d64512ca0abe26b9018b0e162747e1a5b9bbcb83d961b79518f58880ad9b49832e41e1d271ea5e0b87edc8d0ed5d1a6e5de8513a19916719957c5e6e51e8ef13e4ffc933fcec251c3fe7438fb758d4bcc42617a362a032256fae0c62f44ea259fcea5df7fb5fc119d0ca51db807c0ea6dabcbbb9e2cd252a8b9eb2396c20649d640cb1676901d868252ceb327ca05418758c7cfb283204de698270da80b434ecda3055ba8393946961e308a323f19f9009799aff46d80c20f8eb9e25d532ca1f7382b103d766e3e00569534702d7ffcebce2b55d495d3124ab619df7687bfb7f049d12ca48bc9ecd11a96597a7c59d46abe0bad9d5637f61082c20c78e9cf2407671d35c34bec2b841bc6d150260f64ee0c9ed723b34648b5567e5bdb925401c9adc6208e4f03ec15474fddf9a968ee4c8015b7369b0ef3ec4e2ac920bb76ac40fe067b96ee01ec7c9e58a2b42f96de7df028ae26cf86cb8ddd64885d4fc317cb718406a1ce62fd6bcc0a52b735df0ee65a8f6983ba81e212a2c2a161d603717b2d19651b2c2be2a606de5ba2324cff4a7b157926068e6d93e6e294efe3c00e85f7d7b529f6640254f31b0fede18e9afefebaca24b8763b78103cbfb5c356074b368a5c282e9dc4a6c6a7250a7aae44dacb221d0c7ac23d6292a60982fd1452aee9caa5e7f284d29b9a68e64eb603f0175123b1b9d08b65e35048771fa069fda5983dd7e6c406767da5f2968154c991b434c1989620b3ab06a33843073c2c8a11d95b06c1a9e73887a4c2fc4ebd57d9bd15a200b73e34f2611c6204901cebd30c89646c47501c61d336c68ee3f6dd04993a162ac8e8cd0ea858845c45d88eb432df1cc95a192b26d44ecec70cdb5a2ea37829c19ccd37c48cb444153c6bce01e2f467b67839ab4a60ff2fc177337cf9500030cb0e319db53a7bfdc37a31337b4f470e4537f858525c081fde1a7d2f9c40e7720ddf2d28cb0d35c93a54c8071e5994ce3a7010ca13482d2df4b776bdc3a306e21878fa71467e81fa4de710c47495a5d1a8ad29f154902155cdc3983eabbb66a97d2918406b7ab2a800f191f4c1932cbcdbfae327218413da8ab639997a853f3832357796160527984fe9be06c0c9df44ff0f045ec401abd7b860772918484d2f3f9c94bc21fe91843973fe7548139e32468c711b161cf765dc70e9e14691082701b27f462ce495333f78b31ae47ba66fd966b504412a7f39d472454d6cc0d1b6407c9051e07d42aa9a6960dd23cc7998b810a0a94d0bcc823dbe954a1a9208abae41872d97988bb8408cfdefcde7667bd7b9001e1a53932ea1e3010fb17b67f52514ceb3e62fc0907d2ded84eb0dd4ee13dc422a84870798707023d6fd68e90e51f50202ecc60ace9fcacaf828e0cc7c0d44a4dd275d5cedac7024000eefab1ef7af3b97853b72c635a18396c4a3832bc3739d2aa56e85c295f2702cf3c05de6d184612e9f31c0c3804e0c30d4a10f8b6060d33c4cecbc5c92ca8802e18bebec5169d131c166b7b55aa584d9d7f212e31732217747cc6777d2ef87ee8ca9474fec2717e70e66557e857ceae796deded01dd5c8e5c3d2e72bc4944244df193d4f05fa2a601ae452b231109ecf6f361be887ea63d8d995304ee957b14a8a396e7a4fe655931a696dc1225aaa7846940664e30e6de8f0ce5f0aac476a0288f7fd8144b0761ec"}, 0x1015, 0x2) accept4$inet6(r1, 0x0, &(0x7f0000002c80), 0x80000) ioctl$TIOCSSOFTCAR(r8, 0x541a, &(0x7f0000002cc0)=0x3bf5) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000002d00)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @mcast2, 0x2}, r9}}, 0x30) write$uinput_user_dev(r4, &(0x7f0000002d40)={'syz1\x00', {0x1000, 0x3f, 0x101, 0x1}, 0x14, [0xffffffffffffff7f, 0x80000000, 0x7ff, 0x0, 0x668, 0x0, 0x2, 0x8, 0x1, 0x1, 0x6, 0x1, 0x6, 0x2, 0x2, 0x7, 0xdf4, 0x7, 0x4, 0x3ff, 0x7718, 0x81, 0x5, 0x7f, 0x8001, 0x200, 0x3, 0xed34, 0x200, 0xffff, 0x100, 0x7, 0x0, 0x5, 0x0, 0x1ff, 0x3c4, 0x1000, 0x100000001, 0x5364b129, 0x5, 0x7ff, 0x923, 0x5, 0x9, 0xdf, 0x7, 0x8000, 0x0, 0x3ff, 0x2, 0x2, 0x6, 0x10001, 0x1, 0x3b9a, 0x9, 0xb6f, 0x652, 0x0, 0x1, 0x0, 0x5, 0x4], [0x64, 0x1, 0xfffffffffffffc01, 0x15, 0xec6, 0x9, 0x1, 0x20, 0x9, 0x7, 0x100000000, 0x7f, 0x0, 0xff, 0x9c, 0x5, 0x3f, 0xf5d, 0x3, 0x7, 0x7fffffff, 0x1, 0x50000000000000, 0x5, 0x58bda5e0, 0x9, 0x800, 0x7fffffff, 0x7, 0x7ff, 0x0, 0xd1, 0xffffffff, 0x0, 0x7fffffff, 0x60, 0xffffffff, 0x1000, 0x3, 0x8, 0x1, 0xffff, 0x101, 0x100000000, 0xffff, 0x1, 0x3, 0x7fff, 0x0, 0x2, 0x10000000000000, 0x5, 0x34bb, 0x9, 0x6, 0x3f, 0x1ff, 0x551, 0x6, 0x8001, 0x5, 0x2, 0x3, 0x34], [0xff, 0x8, 0x8, 0x0, 0x9, 0x9, 0x3f, 0x7ec2, 0x4, 0x101, 0x0, 0x1f, 0xfffffffffffff0ee, 0x4, 0x3, 0x1f, 0xbb, 0xfffffffffffffff8, 0x8, 0x3e7, 0x9, 0xfffffffffffffff8, 0x401, 0x7fff, 0x7, 0x80, 0x3, 0x0, 0xb2, 0x2, 0x0, 0xfffffffffffffffd, 0x8, 0x6, 0xfffffffffffffffd, 0x10001, 0x5, 0x3, 0x4, 0xfffffffffffffff9, 0x7, 0x1ff, 0x10001, 0x17c, 0x40, 0x4, 0x4, 0x0, 0x2, 0x8, 0x7, 0x1, 0x6, 0x7, 0x9, 0x6, 0xff, 0x5, 0x3, 0xff, 0x8, 0xfffffffffffffffa, 0x4, 0x5], [0x1, 0x8000, 0x9, 0x62, 0x1, 0x6, 0x400, 0x0, 0x2, 0x0, 0x0, 0x8, 0x5, 0x4, 0x1000, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x2b69, 0x8, 0x7, 0x3, 0x0, 0xcdbf, 0x9, 0x3, 0x8, 0x4b9, 0x2, 0x9, 0x5, 0x49d, 0x8000, 0x100, 0x1, 0x7fffffff, 0x9, 0x1, 0x3, 0xffffffff, 0x100000000, 0x0, 0x4, 0x4f, 0x2, 0xfffffffffffffffd, 0xffff, 0xff, 0x9, 0x3, 0x8, 0x9000000000000000, 0x4, 0x5, 0x98ef, 0x7bc2, 0x1000, 0x0, 0x9, 0x2]}, 0x45c) ioctl$NBD_SET_BLKSIZE(r8, 0xab01, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000031c0)={'veth0\x00', r2}) fcntl$lock(r4, 0x27, &(0x7f0000003200)={0x1, 0x2, 0x5ae, 0xffffffffffffffff, r6}) [ 843.815489] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 843.829653] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 843.846946] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 03:41:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x48c840, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x234, 0x1b, 0x304, 0x70bd2d, 0x25dfdbfe, {0x9}, [@typed={0x4, 0x85}, @nested={0x21c, 0x79, [@generic="6d43eeeb6d7402051c58ccce734922abb1c17d75e3d2fe7dc97a9cacba68f8b1b234b09247ed0405bd4b31cee5545d4465290463d8577d22b0fb25b2d02a2db05b632204bcbf4a606ca5fb4082bea5f533f7691c47c6849ae7dcabcd2b04570cc8b8819922", @generic="0e84f438e4810cd47d041f9ea1783e35a7a52226f8fc1d8135e02f98d231c175a89485c2f3d1fd9979fbfce161b54c3688280e7caad8599e8f256cee966cd7ae", @generic='\toG', @generic="28cb4b82faea8bdae4e2f003ba2dbb8c578a0a3cdc343487838ef41c7db02146c3ac35d3e4deb579edf2a25c42994198bd3c6e09fc129dc9b57dfe91f80ddb623cf603a3eac77873cdfd24ed9d69e6421083dca6b65d0a8e150985c74f484663b6663a2950b7aad20c1c6911835b6e2da8d9edcb6e7b61a3b632dffe8075bb3b1fcfb32c28781728", @typed={0x4, 0x25}, @generic="db5d1f59391b5d958e39d6be8f0abab818f85678b38377bcbb161818c0da4dd61a6f15816aeaa8a1cfe9f0a429da2ad1b5fb21ef01e8325c13fe212852f8231ec5e25321335a0c2cac39649c8de3b152fb54479b4c483886809152e9e733b50e25f5f7ebe2e82aacca4de5df6e7f10d8b196a9d5334dce974ac3fc03c3d147fa413baf80fbff7a3d153c6b663a3e848562ccb4", @generic="68344c4f23f218c91a3686353301dc4c685f2b8e3502e3a6dcc4d7c8a338e7d12e93b890", @generic="7efc7b360d83dfdd2e175bde1e5cf52a7376f6b9840e30a1d4e171c413acd5c12a4b90db910a4005fb44"]}]}, 0x234}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) timerfd_settime(r1, 0x0, &(0x7f0000000440)={{}, {r2, r3+30000000}}, &(0x7f0000000480)) [ 843.896385] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 843.931081] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 843.959084] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 843.977979] GDTR: limit=0x00000000, base=0x0000000000000000 [ 843.997760] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ea00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 844.006243] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 844.018376] IDTR: limit=0x00000000, base=0x0000000000000000 [ 844.028469] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 844.036971] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 844.050292] EFER = 0x0000000000000000 PAT = 0x0007040600070406 03:41:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000b900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:41 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f00000000c0)={0x5}, 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x80000040045010, &(0x7f0000000200)=0xfdfdffff) [ 844.067327] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 844.105888] Interruptibility = 00000000 ActivityState = 00000000 [ 844.144544] *** Host State *** [ 844.163346] RIP = 0xffffffff8120427e RSP = 0xffff8801d822f400 [ 844.184762] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 844.210816] FSBase=0000000000000000 GSBase=ffff8801dae00000 TRBase=fffffe0000033000 [ 844.230914] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 844.237606] CR0=0000000080050033 CR3=00000001bb204000 CR4=00000000001426f0 [ 844.244753] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87e01360 [ 844.252014] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 844.258351] *** Control State *** [ 844.269403] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 844.276341] EntryControls=0000d1ff ExitControls=002fefff [ 844.285545] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 844.294408] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 844.301761] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 844.309351] reason=80000021 qualification=0000000000000000 [ 844.316272] IDTVectoring: info=00000000 errcode=00000000 [ 844.321977] TSC Offset = 0xfffffe3993d2d4cf [ 844.326965] TPR Threshold = 0x00 [ 844.333014] EPT pointer = 0x00000001d7f7601e 03:41:42 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x101100) r1 = getpid() ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000240)=r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='vegas\x00', 0x6) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r3, 0xffffffffffffffff, "d9efa0", "7c4bd295186ef0750d393a35379b4929cd81fa4861c5a502a9057fed18eaa8f0b74208d65939550655ee4e2da2d973436166514ec622c1c65619809c619590bb5c517b61b266651d0e80d97582031601ea6546e661b4bea234d18a3a44fc2178d35b9260a2cca7cf9926dedf602e441c12b1c48fd1f1692059806c4c2f3757be758cb7d8440f166f43bb36f95c6e7c02f56c835bb585645e1779f0bbc5f896b8f90f0f8cd42b891941df566cccda9d7d2e0688b346b6b9ab6ea6c23971a945d60daef4e786fe406fa8d20e76a486aa1fec78b4c996a4b5e1d7d0673f4d8672fccc1e29dbbbe8155a20951e43d2122f9b90c5d7000bb98c4fd62c2eba6f87d1f5"}}, 0x110) 03:41:42 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) socketpair(0xd, 0x2, 0xfffffffffffffffc, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000100)) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffffe) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000ef0010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x10000, 0x101}) sendto$inet(r1, &(0x7f0000000280)="f221fc43efb1e22e646f7d77ae8e94cdea7b2be208cad3b7e9657442f978ec1d6733ac9e7c345a6cae0f9d28b0e7180a24bf863e729e63312db0d93f4e51424503e00b5a7bdc8ecb1925a2d9912ec4c7e137ea1bd859565e0412ac15b558e05e27103e0d99bb6ee6e85a382a5ffbfa85ada08ce0c21ba41efae691b476a339827dee4cda4794018b359beedba6cb9480f882cabbf9f678680fe12eeb395790543a79d4547499ad70217ac43b0fad4a4fad1f9ea860023f07bd", 0xb9, 0x1, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x5}, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f00000001c0)={0x100, {{0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x10}, 0x1323b236}}}, 0x84) 03:41:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:42 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x4000002, &(0x7f0000ffb000/0x3000)=nil) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x410000) mmap$binder(&(0x7f0000c0c000/0x2000)=nil, 0x2000, 0x100000c, 0x10010, r0, 0x0) fremovexattr(r0, &(0x7f0000000040)=@random={'security.', '/dev/audio#\x00'}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000001c0)={&(0x7f00005e2000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x2000, 0x1}) 03:41:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000cb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 03:41:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000e600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x7, 0x24002) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000000)="e0", 0x1}], 0x1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x40, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001040)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) close(r0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r3, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7b}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_AF={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x40001}, 0x40) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) preadv(r4, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) setsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={@loopback, @multicast1, r5}, 0xc) 03:41:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)=@ipv6_newrule={0x34, 0x20, 0x3, 0x70bd29, 0x25dfdbfd, {0xa, 0x90, 0x14, 0x0, 0xfffffffffffff7bf, 0x0, 0x0, 0x3, 0x10000}, [@FRA_SRC={0x14}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 03:41:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000e500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 844.983533] netlink: 24 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:42 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x110, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a45323, &(0x7f00000000c0)={{0x4, 0x40}, 'port1\x00', 0xc1, 0x20, 0x7, 0xffffffffffffffff, 0x4, 0x4, 0xc0, 0x0, 0x7, 0x100}) userfaultfd(0x800) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) syz_open_procfs(0x0, &(0x7f0000001700)='fd/3\x00') dup2(r1, r2) 03:41:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000bc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x88000, 0x0) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x100010, r1, 0x100000000) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:43 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x208080) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xa8b}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x2, 0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1, 0xffffffffffffffff) ioctl$KVM_SET_CPUID(r2, 0x802c550a, &(0x7f0000000080)={0x2, 0x6800, [{0x0, 0x8150068, 0x7ff0bdbe}]}) 03:41:43 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r1}) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000040), 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 845.691711] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000e700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000fc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000004a120005d2331699bea8caf081a390c320010000100697036657273700200300000"], 0x40}}, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 03:41:43 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e22, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) ioctl$RTC_UIE_ON(r3, 0x7003) 03:41:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$vnet(r1, &(0x7f00000002c0)={0x1, {&(0x7f0000000040)=""/105, 0x69, &(0x7f00000001c0)=""/219, 0x1, 0x3}}, 0x68) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 03:41:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 846.146832] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 846.180866] QAT: Invalid ioctl [ 846.199574] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:44 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendfile(r1, r1, &(0x7f0000000140), 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x800}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000003c0)={r2, 0x4af, 0xfec}, 0x8) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f0000000900)}}, 0x10) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r4}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030ebdacf"], 0x40}}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x401, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0cc5605, &(0x7f00000001c0)={0xb, @raw_data="f2ced89883cbfb2a4ceea782c9e3e3fefdb1c8f01883c6706526c36171c653a950b72c15845bb683eed84bbd1bf7918af6328ad030501e4458014d4aa6e7bcce9d841a27851669593932b2a567560b4c2e7042b07e38cad79c997302bd278c7fcf4acff548cd014fbb468972e2427fbbef77455ec7ef8285c02ceb4fac2894a41a2b4dac11f22d4fc2d94676d272d8b5641110c27c3283940e4c42f440ebb41bc74ec205c813b6ae1626efbedab5602605420434ab8c146feabe838d2ff0c1394547dcc5877fc0b3"}) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000080)) 03:41:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 846.513945] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 846.580785] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x202, 0x20) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180), &(0x7f0000000240)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = accept4(r1, 0x0, &(0x7f00000002c0), 0x800) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f00000001c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) recvmsg(r2, &(0x7f0000000f80)={&(0x7f0000000b40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000bc0)=""/162, 0xa2}, {&(0x7f0000000c80)=""/58, 0x3a}, {&(0x7f0000000cc0)=""/54, 0x36}, {&(0x7f0000000d00)=""/90, 0x5a}, {&(0x7f0000000d80)=""/242, 0xf2}], 0x5, &(0x7f0000000ec0)=""/159, 0x9f, 0x1f}, 0x10001) connect(r1, &(0x7f0000000fc0)=@can={0x1d, r4}, 0x80) ioctl$DRM_IOCTL_AUTH_MAGIC(r3, 0x40046411, &(0x7f0000000040)=0x2) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000280), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@ipv6_getnetconf={0x1c, 0x52, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x9}]}, 0x1c}}, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000340)={[0x4, 0xfff, 0x6, 0x5, 0x3ff, 0x3, 0x10000, 0x10000, 0xffffffffffffc44b, 0x406, 0x5, 0x2157, 0x3, 0x9, 0x8, 0xfffffffffffffffc], 0x0, 0x308011}) 03:41:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0600000c0002000800020030000000"], 0x40}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e20, @multicast1}]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x3, 0x4, 0x401, 0xb227, r2}, &(0x7f0000000200)=0x10) 03:41:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009d00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:45 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20020001}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0xffffffffffffff8b}, 0x1, 0x0, 0x0, 0x80000000000}, 0x0) 03:41:45 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @loopback}, &(0x7f0000000100)=0xc) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) sysfs$3(0x3) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_ifreq(r3, 0x891d, &(0x7f0000000440)={'syzkaller0\x00', @ifru_flags=0x8200}) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffffac) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000380)="c361464e954bc0a9c5f561c80da792fae00a12f7201ce09ad578146e7ccc581c86673d2b0108660f9d093d98504729146c57064b3a802c1e32411e6b6a7f684912e5d5e11ea3e4a2c3969657cd53bf9041fa290762aa20ed7f6fcdf6a5f301f9834386e870fdfadb0f053817cc6a21a2203a6a9c5481a7364f7be060f9433a83cba57af45f136b", 0x87, 0xfffffffffffffff9) keyctl$update(0x2, r4, &(0x7f0000001700)="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", 0x1000) 03:41:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ad00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa000, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="024f2c6ae1de3070"], 0x8, 0x1) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x40010, r1, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0x8d, &(0x7f0000000240)="80ba5f4842c526efab2d1d3e4ec482c7a47851923814a2809c2d1faedf70440e81e92dc3047dfb4f2c86545c3af85b7bad85e532c566ba5b530d2ec54afa3013e5e1e3c433c8eac4c06871558dc31878f829f947b730b7e7d94c915d897bba99ddbceb18c3273c2531c0", 0x6a) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0000000010001fff000000c4f110a300f4ffffff", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) getsockname$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @local}, &(0x7f0000000380)=0x1c) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x208000, 0x0) getsockname$packet(r1, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@mcast2, 0x24, r2}) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000002c0)={0x2, 0x0, &(0x7f00000003c0)="485ec4d6681941e73ec99c777b7a0ec3be34683dc68ef477a61ff4d8305195e106ccc7245fa2bfc5821a7c97d0df1973707e0af2fbb4825c8ef10881f6583319a48bb9bc4c5fb14acd2f510cfb6a67563ae2f197be2b4754855346b5939f0964b9987832070e60f7945856423ad63973ad9670e6036243d4e6e7b1c6e8d5203fcc2d585d8f9138d868162572681a64472a9e0ab34209bb70375e1747f17fa88c959745b304c7f925150e9021edceb25f77b59f77e9e51956a59020fa6dadaa2f9d9449543d24a176d12670ca976a9e9bf7268f393118abac7faaf2d2a46a", &(0x7f00000004c0)="8ce802dda72f031528dea3d93acdf0796c912f97c77b03c8736df2a3be1deea88baf8aad1c130698dcac475474dcf5567c12945851ead0b655b675661146834deaf2aad81c4b2a1cc28ea04c6c02457878ac67ca88cd3614346b18e774e083f42bde5335c1da7108bb0f46cfbbdbfbbd1cdc4cf5610231e7fa4effec6caf76d7230fb49b3b2797800ca8a2ef8bfa85113f7dabf86ec8bc4aa2871c8c35074c588f793519cb4d07954e580754aced9938f627a014c04820b2b4a783fbe4d5fe25e78922766945e0a2f7bb1768e89c741cf8555e43254bb061f208f32371b8bcc0333ddf5fbdfc5301fe0124", 0xde, 0xeb}) 03:41:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000e900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000050000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) 03:41:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 847.907442] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:46 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x402081) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x9}, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000080)=0xfffffffffffffffa) 03:41:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000e400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:46 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) ioctl$VT_ACTIVATE(r3, 0x5606, 0x100000001) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x18}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)={0x7}, 0x8) 03:41:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000b600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009d00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2, 0x0) ioctl$KDENABIO(r1, 0x4b36) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012091000010069703665727370616e60dca3df95013a1100020030000000578297db4166417c0eb92bd5b438220206fde33f71ae96f67651134288cbbcc1950086fa1a281a4b59f3bd51953a016514fb02f5208fcfa6070ad8fbf089d0c47a8ab567132acecd7cf68d90f37958f8d84f8dc6644ecf8a63c36aa16cf40d6190caaef14088b335e476cbf8635925b9bea70bf0"], 0x40}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000040)={0x8001006, 0x8000000000000000, 0x1}) 03:41:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000a100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) geteuid() 03:41:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x9, 0x0, 0xa, 0xe, 0x76}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000040)='syzkaller\x00', 0x947, 0x0, 0x0, 0x41000, 0x1, [], r1, 0xb}, 0x48) 03:41:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 849.306641] validate_nla: 4 callbacks suppressed [ 849.306651] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 849.376020] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:47 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) geteuid() 03:41:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000001000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000005, 0x1f, 0x1) [ 850.015061] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 850.061377] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000cd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f00000001c0), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000122010000100697036657273709f6e0000000c0002000800020030000000adc84177ac9103378320455584aee397cd92ee88846e9a8894d6fa2d62aacfff07d6f58b718ed43c9c359108b1a2c1dc63b8ed51488cb70100008064e4962f310483"], 0xfffffffffffffe5a}, 0x1, 0x0, 0x0, 0x80}, 0x0) 03:41:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) geteuid() 03:41:48 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x2, 0x2) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000380)) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r3}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009c00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000001000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') [ 851.028839] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 851.069110] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000cb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000dfff0f001fff000000020000040009000000bbb68022dbff80362fbbe8ce67214874a175414ece336ba3c700e21aa15b79169d777343829c7e5f69e21c15d4b973ebf233204134c03638d9f4a4e32265490348fff43127c0387444fbfff5a258240bd4a3efd1984755e0c90674ea4b68648176ec2ed5c1dac982deca623bb78b86fd994110d35bd170dfeb415cb92d669b763d36087f4843df208272643ee76bb4d19a16f94ab57ad13196197e23b2c39c55bb64804f0d8628cf7b3b8123bd5beb1616efa752fd4dcedca7", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) 03:41:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:49 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="0210946d650000d998400000000000000000001f1c2014425ce86d234b9d7966b1c03c4b5e072fc9c52ed5fbab7919a01163d2b3c001520d0f957b88e6114788d0491a04bbe37119e410b1208c3769f12a469da19772b820ebb8b96412c95d07dd7ffc8094035fa27918d62f8fc2e1d6796239d985f051553d9eca7d08b73f68176b9787850823b1257f00595a99d2bc4871e52d1b50164059dfa100000000df94f3ff9f348f833b4d3c4c797d42b0be55502bf149a12a886cb08345b146efdd37ecf59698026f3007311d99a138e4dcd625fc2a741ae60c7ab71d79cf2f8d6ee2d307560e01b7ce5aed68d0b4d31ce2b262f81a64b67e8e6685cfe8a9af16d190a146d676cb85cb595bf3be4c73790cc3c01d5e356e0d18d76545b4776a000c98952f6a4886d001e865bc8b365b1ec0bff6d8dd3c4b1bacaac508343af6dda98e145091de33ab177dd42fb1f2fba11ca3775d38bcb177d74f28cd6acad497ba5893bfb7b7e1363bed5c9951120327c42ce1b704244ba4a44ad9e804a923bb26feca77238725f4ed82f2cd4ae0e9a1182aebe67ab5f68adf92a2445708b26705d0479d8c0c2e8bbef8cb07469138276cdd92b1a5e78907000000d479f92a07d34757e50f77cba0770168ddb267ca7a117c44492433748aad01e30ee7aae690384c4333cd1d67b75a7f1441370b943e17d8120fc2be588bd25c9fec87006333e09c6f22e4616318c7ef2ac7fe703c4de781634bc41f3afb9c106ca4bfdb547316343383af03ac31abd2ead0dbc7a0fe67f2cd5cdb5ca7"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000020001200100001006b703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) 03:41:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000e00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvmsg(r0, &(0x7f0000002080)={&(0x7f0000001c80)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001d00)=""/241, 0xf1}, {&(0x7f0000001e00)=""/36, 0x24}, {&(0x7f0000001e40)=""/14, 0xe}, {&(0x7f0000001e80)=""/171, 0xab}], 0x4, &(0x7f0000001f80)=""/217, 0xd9, 0x2}, 0x40000000) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000020c0)={@mcast1, 0x4a, r3}) sendto$unix(r2, &(0x7f0000000040)="112cc86aa3c173a8760a417fdb6b", 0xe, 0x4000, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 852.232943] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000e500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:50 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0x9, 0x40000) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x4) getitimer(0x0, &(0x7f0000000000)={{}, {0x0}}) r2 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYRESOCT=r1], 0x1, 0x1) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/245, 0xf5) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0x8d7) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000500)=""/106) r4 = accept4$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r5}) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) flistxattr(r4, &(0x7f00000003c0)=""/226, 0xe2) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000040), 0x4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r6, 0x5425, 0x0) write$binfmt_elf64(r3, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000380)={0x7, 0xa573}) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x2000000, 0x800, 0xfff}, &(0x7f00000001c0)=0x10) 03:41:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 852.917541] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 852.947937] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:50 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$sndctrl(&(0x7f0000000380)='/dev/snd/controlC#\x00', 0x8, 0x200000) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x101000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14, 0x80000) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$amidi(&(0x7f0000000500)='/dev/amidi#\x00', 0x0, 0x26200) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = mq_open(&(0x7f00000005c0)='-bdev\x00', 0x2, 0x10, &(0x7f0000000600)={0x35, 0x8000, 0x100000001, 0x2, 0x8001, 0x1, 0x4, 0x7}) r1 = dup(r0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="4000001fff000000000000000005000000000000aa3d8c9cbdcb3b9584178f71a8115e9772fffd5d5691b601e4c85c7ffd68896d041063e93669bf341c3ca1ccf7dafb95b3c9cbe5b3c74964fcd7f615ffbfe6bd5775eee7239810c0368e19898f2ecce53787559ec1664a52b19ff3fe2b5dbc30aacd181a109a12ae5a70f7ceecd376989babd9fb14daf728626f0233e26b1127d0d50c8f9dd69b64d8e11aaa09651ede3b8b41b95ee06e8f8818", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x3) 03:41:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000e000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0xfffffffffffffff9, 0x9, 0x1}) recvmmsg(r0, &(0x7f0000007d00)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)=""/216, 0xd8}, {&(0x7f0000000480)=""/109, 0x6d}, {&(0x7f0000000500)=""/208, 0xd0}, {&(0x7f0000000600)=""/131, 0x83}, {&(0x7f00000006c0)=""/75, 0x4b}], 0x5, &(0x7f0000000780)=""/11, 0xb, 0x401}, 0x5}, {{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000840)=""/171, 0xab}], 0x1, &(0x7f0000000940)=""/31, 0x1f, 0xfff}, 0x5}, {{&(0x7f0000000980)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a00)=""/100, 0x64}, {&(0x7f0000000a80)=""/134, 0x86}], 0x2, &(0x7f0000000b80)=""/180, 0xb4, 0x9}, 0x800}, {{&(0x7f0000000c40)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000cc0)=""/133, 0x85}, {&(0x7f0000000d80)=""/160, 0xa0}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000e40)=""/60, 0x3c}, {&(0x7f0000000e80)=""/171, 0xab}, {&(0x7f0000000f40)=""/191, 0xbf}, {&(0x7f0000001000)=""/177, 0xb1}, {&(0x7f00000010c0)=""/254, 0xfe}, {&(0x7f00000011c0)=""/92, 0x5c}, {&(0x7f0000002380)=""/4096, 0x1000}], 0xa, &(0x7f00000012c0)=""/2, 0x2, 0x4}, 0x5}, {{&(0x7f0000003380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000001300)=""/45, 0x2d}, {&(0x7f0000003400)=""/99, 0x63}, {&(0x7f0000003480)=""/41, 0x29}, {&(0x7f00000034c0)=""/179, 0xb3}, {&(0x7f0000003580)=""/2, 0x2}, {&(0x7f00000035c0)=""/18, 0x12}, {&(0x7f0000003600)=""/243, 0xf3}], 0x7, &(0x7f0000003740)=""/66, 0x42, 0x4}, 0x80}, {{&(0x7f00000037c0)=@nfc, 0x80, &(0x7f0000003c40)=[{&(0x7f0000003840)=""/116, 0x74}, {&(0x7f00000038c0)=""/50, 0x32}, {&(0x7f0000003900)=""/56, 0x38}, {&(0x7f0000003940)=""/166, 0xa6}, {&(0x7f0000003a00)=""/83, 0x53}, {&(0x7f0000003a80)=""/85, 0x55}, {&(0x7f0000003b00)=""/88, 0x58}, {&(0x7f0000003b80)=""/65, 0x41}, {&(0x7f0000003c00)=""/1, 0x1}], 0x9, &(0x7f0000003cc0)=""/81, 0x51, 0xffff}, 0x1000}, {{&(0x7f0000003d40)=@nfc, 0x80, &(0x7f00000042c0)=[{&(0x7f0000003dc0)=""/255, 0xff}, {&(0x7f0000003ec0)=""/25, 0x19}, {&(0x7f0000003f00)=""/6, 0x6}, {&(0x7f0000003f40)=""/148, 0x94}, {&(0x7f0000004000)=""/125, 0x7d}, {&(0x7f0000004080)=""/196, 0xc4}, {&(0x7f0000004180)=""/23, 0x17}, {&(0x7f00000041c0)=""/200, 0xc8}], 0x8, 0x0, 0x0, 0x2}, 0x5}, {{&(0x7f0000004300)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000004380)=""/244, 0xf4}, {&(0x7f0000004480)=""/4096, 0x1000}, {&(0x7f0000005480)=""/68, 0x44}, {&(0x7f0000005500)=""/242, 0xf2}, {&(0x7f0000005600)=""/151, 0x97}], 0x5, &(0x7f0000005700)=""/243, 0xf3, 0x6e8}, 0x8}, {{&(0x7f0000005800)=@can, 0x80, &(0x7f0000005b00)=[{&(0x7f0000005880)=""/244, 0xf4}, {&(0x7f0000005980)=""/241, 0xf1}, {&(0x7f0000005a80)=""/32, 0x20}, {&(0x7f0000005ac0)=""/9, 0x9}], 0x4, &(0x7f0000005b40)=""/130, 0x82, 0x3}, 0x10000}, {{&(0x7f0000005c00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000007cc0)=[{&(0x7f0000005c80)=""/35, 0x23}, {&(0x7f0000005cc0)=""/4096, 0x1000}, {&(0x7f0000006cc0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x5}, 0x2}], 0xa, 0x1, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007ec0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400142}, 0xc, &(0x7f0000007e80)={&(0x7f0000007e40)=@newtclass={0x40, 0x28, 0x0, 0x70bd2a, 0x25dfdbfc, {0x0, r2, {0xc, 0xf}, {0xfffe, 0xb}, {0xe, 0xa}}, [@TCA_RATE={0x8, 0x5, {0xa1, 0x1ff}}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x9}}}]}, 0x40}}, 0x8000) pause() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000001c0)) ioctl$VIDIOC_QBUF(r1, 0xc044560f, &(0x7f0000000300)={0x2, 0xf, 0x4, 0x8, {0x77359400}, {0x5, 0x1, 0x80000000, 0x0, 0x2, 0xfffffffffffffff9, "3042d730"}, 0x0, 0x3, @planes=&(0x7f0000000180)={0x5, 0x2, @userptr=0x401, 0x6996}, 0x4}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0445609, &(0x7f00000000c0)={0x100, 0x4, 0x4, 0x400, {r3, r4/1000+30000}, {0x7, 0x2, 0x1, 0x0, 0x4, 0x6, "e643cdf2"}, 0x1, 0x2, @userptr=0x7d, 0x4}) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000d27707b123c3030f6ecd", @ANYRES32=0x0, @ANYBLOB="000000000000000020001200100001006c703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) getdents64(r1, &(0x7f0000007f00)=""/185, 0xb9) 03:41:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000b300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:51 executing program 2: getitimer(0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x400000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x6, 0x21d) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x8d7) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6gre0\x00', r2}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000008c0)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0xfffffffffffffea9, 0x1) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) connect$netlink(r3, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x800}, 0xc) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 03:41:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) [ 853.958103] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000cc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 854.435525] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! 03:41:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x121100, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) recvfrom$packet(r1, &(0x7f00000001c0)=""/165, 0xa5, 0x40000000, &(0x7f0000000380)={0x11, 0xf5, r2, 0x1, 0x7}, 0x14) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f00000003c0)={0x3, 0x0, [{0x4000000d, 0x9, 0x3, 0x8000, 0x1, 0x0, 0x100000001}, {0x7, 0x0, 0x0, 0x1, 0x100000001, 0x2}, {0x1, 0x9, 0x6, 0xfffffffffffffffe, 0x20, 0x3921f45b, 0x8000}]}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000440)={@multicast1, @loopback, 0x1, 0x1, [@remote]}, 0x14) 03:41:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000001000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000fb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 854.690871] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 854.775790] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 854.791815] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 855.031255] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000a100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 855.276160] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 855.319921] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:53 executing program 3: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) gettid() 03:41:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000a900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000a200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 855.493319] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 855.561397] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000dc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000d1810d651100200012001000010169703665727370616e0000000c000200080002"], 0x40}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000640)=ANY=[@ANYBLOB="00000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000200000009000000000000005800000000000000f8ffffffffffffffe4000000000000000000000000000000000000000000000000000000000000001f0000000600000001000080000000005909000000000000650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b62400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a8c0c80cde1d22a8414cc2ef05d8fd0000000000"]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) ioctl$KDSETLED(r2, 0x4b32, 0x9) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r2, &(0x7f00000002c0)={0xa0, 0x19, 0x2, {0x0, {0x40, 0x0, 0x2}, 0x0, r3, r4, 0x1ff, 0xff, 0xfffffffffffffc01, 0x6, 0x3, 0x3, 0x4, 0x4, 0xcb420, 0x92a, 0x3, 0x3, 0x6, 0x4fd6, 0x3}}, 0xa0) r5 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000380)={0x0, r5}) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000400)=0x7, &(0x7f0000000440)=0x2) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1200040}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB="215236e4", @ANYRES16=r6, @ANYBLOB="000327bd7000fcdbdf2501000000080003001d000000080004000200000008000200020000000800020002000000080002000a000000080003008f000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x40000) pipe(&(0x7f00000003c0)) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000600)={0x2, 0x3, 0x2, 0x2, 0x97, 0x24f5}) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000980)=0x4, 0x4) 03:41:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) [ 855.785613] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 855.843992] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "36229b3de6b1ed5fbf744c8abd6f4cd3"}, 0x11, 0x1) r1 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x81, 0xc101) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f00000001c0)={0x1, 0xfffffffffffffffb, {0x0, 0xfe8000000, 0x301e, 0x7, 0xc, 0x1, 0x0, 0x7}}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000000240)="e93effad386abe348dd8acffde4a504af266641279465446fb8c31dfb7079cbdd11239643c0affad8045eb527ef6dd8ed11f78a42c6783c10c59c0bd22cd6cd4ee68445609ee4906854474ab9716bf3592ef25aacb11a5165ef54ad9946292a1cae217151a392e6aa90c10014faacefe5f4b295cb5c95a49f0df34e3fcc1c6c441588760bdb8bfbf4d8cf84470a03063a70416a7ea438262d92690bf00cfa030a4ae9ee2608494dc7160c2f314d3ab5672e6e879d3d6698ebfaf06e485f816e7ecd498e3973ed5f1e1c87008fe2418b3825bd4afb06fba9f6b0d3335ec9bc8c218b632eca70cca973a1a4e0fbece7be615", 0xf1}, {&(0x7f0000000340)="58a1ecd3853177a9c2d452b6d0566988bbd02e1ea118ad26b040876def7a931364239461170b5d66c4a1043a81a866d5bd516cfb5a8a2ec77aa3bd02249a433e563e8633d02d684749271a77d95783ce2afda2da905d853eb243540d0f59acb6d3e7333dd134b138e4695162487caf830ae5d334a383e539f31b3c45dd58d75e5aaff3b082a8e936c6bf899bbbedfe70262e0ba2118ff27ae3e322585b5cf042fc0338470486dd39cceb28c0e1efa21a2915b2bb3ac8e6cd1cdfbb48f16dbb7d00822dd629334fc8cc12fd1341b46934acb1b34dd3937e7a2a3f5b2f7245440358b92d6e75d5cf8b947b1dc6644b7a9de6b80982daa39ab0b27ad2eb5e569ce4da06cb3fe3c4d7be5b91e108a8eb288894819becbd6f2ff969be4ec2c5807232e91b2aa076af051f78acf1047c5c160a4f1f55f4bacfc431a48152e98a73bed894db484ff3829d9ab2bcea3b3b8ce79126688007f45414dc2fe71ad52566c437cec994b22a6d992a9512343d4b0f06e521921bc0167e33908235b444c9ac8e28ca5e2ccfc0d4639c408fd80d5716bd1469595c73f66dfb672ca44e5aba34922bd8a9f018fbd14c154850b711c19fb2f9314509be8c793274508b20bbaf06996e2bce2c10b085a27a2faf80862b0882d6b62eedd6e339359e729b105d5f6a111ffd06faa42d07767a3bf0049d88f9a601bc17787afa6d193f2cc5dfc4cb7bf265e1681be2a86b639b8053ab7799fd39fd686ee23c9fa6b8ec9106e854ee9164fc5ffe105b9bc454b5f180a53b965e640a71be0d0c68e6b704449160735f500bc7790abec001ed04b1cd6c446ba0bd6065e45f72836942915b692da3ff5879ee4033123b05386bfed7b0819deb2b8eee7f07fde735cad893496a1d8023b8df226b08b5f333cb73e4f831876f36ec2f824c7a375a8759ef9bdd3ffe92fca79b541452ef8d2da15eb4458f471b27b23e02bc287a848075800ffe589c5dc76b6e5686e06483dbf23eb116dea1ee69375f8aa454ff03cf9495be95956bf45ede0366dc85aadf6f7fcd6ffb5efc36cc4a5ddb374d09a80c3320815a5e5e495ff9783ba205f55f7d00d8a7e52b5485c0b46d951b7b932355ab8f38807a3b9c9ce4557b3a7f95450c6fef6f84ff8f1a290958c510ad124ce3ee1a3f7ef54db01781da62bcc49e2d83e138724c806157c4bfd9eef180828d99649b9eb62ba057a2c13ca13a6cb09e56474100eded4b364ceb810183c2cffef97468646896ff43636c9ec0d89b319e5de4cff80cf55c21fc80cfe9718a5daaad0290a5887a8470f9aaab071627c3874d0af78a4d9a2939cd898f2c7b7cd2f68181b63ae32caa1d418d7675d185bc2cafed0eaaa5108ddaa9d671537719fc25995925ce334b92e6b715c687540380cec4a4f832ff256d794c749c17d036e11ed5dc7a349ba0ad56f101dc89b3e13d21a4dd8035caaa16700afeac726de80eb3ebf6334df7714c0f35c74edbc1eaa7a4d4da4e09682ffbc2c8a5662b32696d6c2845a58ee21f0fec79941a77c317a7b779ea65947a6ff9ea391127dc1ed43c1928f0fa779e115f26223fb13fcf5a9b653504c7361e0ad717f1a0fb3a09a94fec3efdff2e92f4d6a024dd507d6082d22a9abdc91d56e93c3adac1d0a83197a93e06449cd43d9d55d0804d8c96637c491eab9b074173f4beef11b60a11ec759946f08f9c53f37b3e29924678cf608eb8d82fed7f8deb65c99548cf7cf57dcf6cf2f688815815c391b09388f8dd5c2d0c30f00d3e1e00bbbbc9d2e69713028c5d0828b440d571feb76a20e8c9b06abfc40fbf3490bfc4e3bbd4092f0398b12e65be9724ed7e8e6608dddb78543353d16beaa529a7492c9960b5479451f22fc0ee77386a99e49ed42459a1cb0b43b0dc48dcecf5b5a1edde55dc36d76f51c5ccc0b3eb9a6cbff3d9b859e3b14dc9e11433ba1a0198e0a3f29720da90d5cdba637ef011c53d48b159a673fb461b35ba9fee5b5c2d6c842d210effa97da2612a73ceb519b4fc4713a39954bbb5248c6cd0c52c1f3eb6e8549ff51a8f5a3b7e16e609e2824739bd6d134c61b14e58447d9d14f08e329089403fb18a141348fb91308db14d9851e824eba92d01e7905591af6dcad7c6818d4e71e48d3162726a68bad7ba3281b3c698842cb5737eeeae3ac613ab121f3e8e709b3885f3af15452d3db64691756f74ec6e00fd627fa5d51d6e5a15aba6cf938f1b41b2b44dcccc4c4ff60544cbf8db95bf7f17ca0e1ca6f5b08eb21b309c99090c4e71ce3de3db7a92fa1eb8662a51419a3546dd1360233202ee64916bcf366a094ac3579024bab2f0c71fb04d4f9052ef02cde7286c96b8610752cb5fcea677ac1c6e1962724d9f270c17a001bb4fa43d0e8794c3f56578d12b48a07e4977b60c8dd365e2914360a9eaed1d1ab654fab4c5185940990bd8b24c3fe74a7e57c8442b3d02ac8861edcc8a52ed8e61227d16dfd6676590a97e635a276e16b6a8d1602583eed28fc1ec3aed740e739abe2aa44165dabdf9d5e6b2d983553ac226bb57733d6c7d8fdb24d40c033aae72320aaec4cacc6c7e75d3e515e63311035adab50449ccde7522a48a61519d2cfee45620ccd43bac2b29f95880e71282eaf897508852fe62211f3253b9b7665c060e97c1776e5997ed4d9b3fa1ba524926ef34fc6e3f76e1ab125198c085897fe95e9d73e7253bacc3778b1dda6d4858977b2ab2a44961391a9c56a6d840bd65446c7b9b06bd3a24a62229e703f80c56a2a82efa1a455e0415ba32398516e20c3e3d516f667184b2ac7257946304efb5fa5a4791d49fa82e0e536f56a35d04259230b16eb826841de24201db28e7805a128f448b1688530ac6ba1d4c1974dc6a5ec94b6bb4e138135efc92b1660cb3c55cef5d20bed0bf163b0fbcef955bca8ff7303a07b9248bc4c10d7839c49a36ca38b371bb39d9dd146810a56096627e85f9274583e306305c3307d1125438181eb94c563badfd37ad1693e4d013b368c648827cc305fbd1ed115ce545fecbd6a5ea76a9cf466b1e6edc1a8b52853230c1bd125e34fad1be1bb6c980acad6c2c58127979de259b7308780fc782231e3940342c3baac96f587ee0104ce559f47059fe4d79c90cd4fa1d0021b52406bb5f37a7e4426340f758be2848bd219d1782b243a8469b32be01a96d5e631fb314523e464d494a5fbcc814c5c6b576a96ebdd2cb0addcdddd189f66b81690df2c9e93baab6cd5213ab4c48703f8c4895b9f226e115d6d93e1ac4ca56bfa57c9f8326691a57a323381811592214c1082f7ca649e7c0746545bbd11326aeda028bb22998edb5ca5092a03e6ebde67400880479342dca886b07d1d8c01e2041be8663acb2dde4f197a088bb3083fd45bd5369ed2bec03daf000717960c83530f149397a49d7f4256e9a12d79de3b0ffa038b944331c98c8627dc6b0343e5b53e1fd4b982a3d699946b360489e327268476935a02339cb7cc4fcc8d1799d1264069cbf507767960ef038666ce86b9c6056de58058626dce1b1a2b7d903d179e07ea627966c10e01c2dc16e6ac521f97c3d8dfb6ce9ba70ffed93c0f6e3b01b6d8eb666d4013f46a5e38b18f6301995696c06ff1f8be4d8b0e79872b06103a278125f77c6316332843c4bc3cd713dae5309818e3921c361e978c3e04720ad916b656533a13979992e2d8ccad8b355278a02e90b0d3b273241e1d8e6ab0529db328d75646fd7fd79353c4d40e537bcb1d1a8cb392808a23a04af68609ef7403feddb191ef8e55b270b93158b353a6e416ef58c8003b2fc48b05e4777263fad89109603b63e3d5b621bab69ae23e43b0f6da81a1569527794a54744ea0e5f3116427bfad2fce9a6b68e82bfcdb5e3d5825862d173643aee1166555b56d44903f7eee5890e1ac3988511db8361d38fcd51258eead27fa9e58abf41c93477e3d5e97b9f5bc63ca015f51ac95deb3fd6f4fd00c68227bfd24fb80fb2b88536f751ceb96f286637c770273cf1dff031d8a9c0c41629e12a09d9a9ceb6fa4d6c3ad0a0cd061dd4cc7f6e0dab48358bf50ce7620814d423066d4356670cff15c04335bf357dcbd247b7f2f485558d242f1b44b624c847678a50ecd4537356110a3bf6622d702bf1a3425f455e3dc87ab9c10c01471c57c067e0a5d08c514ee69f5ce94844faa7b518f167c79842ff86e6e425218a989a7cea6c07e4cd227d416e41047dcef30bc6c84637682c45cfff1b915c77d495e5e7fde9ec80a68ef4392e7e180674a29b4bbc3b2f137f006732f4b8f90397269fcd42365b61e88ea1339611eb203323d983fdbd127fd072a111d2a9553e31e5d5fce9766c92b917912f65dce958039d85d29f27695ea94818256da193b12598c72dec5ea351d9dfa9b8f402528a3e6b3dbf4d3aeaf6d78f2565128d334cdd5a028abd87f06efb3f082b6ea62754f0be7ba82545b3e83af224f546dad99e2b3c7dea5e2b8fa3dc1dc73d8632bebcc8833f0d99ed8371109e36248248e94a6bafff651367a349be211d0f9b67527767ad50f9f9e179d4fd191b279af483744b2e06b5f14023a9a87128aa8c0fc058affffd0954e8e63c201a6262792bf2d625992d33cf6a813c1894a66ef75bd14a52eeb3ddcc5910f814bb1a2a739dbf87fb01229ffeb984df72c7788e72a1420a999bddde0b9e99760d513dc417d22058c94e3943d67551b8c6155daf7004c098ba2cb7d1e58f2cfa1579e547123b5f42bad510ea0d8d38cfb3049eed6e70988297aea6e2f085e3b42c5c417c48c1537718283dbd6833c5a937a0c39c49e777afec39203f2bd37d0b37582b480262a3281a73e63b7b74fec39bf3775aec97a8920d54a2b4b2ce53cc95bb0df8152ff283d3f2656a17739751270beca35e52e8b7518983cce582744f91f4ac131b82c95a8c3bd156663c38e1e0fc2fdc6bcfb3b9f117014d6ce435a8fe359657c6d0c5e420f667875a40bc39b0772c6d9e708d2047508bd0752fb0df79e00f6030035d1966aaae1bbe72299d4963a2b9865de60382a3b73b9066801c22714e5e7397c3cca33318c74a128266998a93ab061b4fee4cd41401890ddd7dfe96147841cd7b952d9f14b5bbd210d28909b214c52a41d4e45621cc263ca1b8cf1b3792a5687330a8367ce9184ce6cb43cd8fd78d34e2879bf2ac3b7a7bb2961cd9b295459f26a894c2360ab597663722c8879124ebbaa7c5a0458562e4d3a70bb418e5fc8048cd2ad5828e12551f2cab3e7402fa67ba31ee10b2b3a501696ee14c70fe31919fc61154134153d5f06f8f9a1f1bb943d6ba1907e3f69c1a2472d305f275b6446edff56e026079fc8711c5c5721c8a858d8e6860030075deb2ccd8e69baeb588baf9d046b69e3719786f0097f0aac7827ac4c6b7a3a7fc374627b6658a3cae0ad131328858a97cb40f288e4b1cda6d33ef73cca03d6cb0314fa381fbed0cd6f9f274887a08e36c0b4af612a4050cd31217ce83e17ce10fcbcb248ea33326b184b23dd507f51f86aa1c137f47a9a934e7720dcb85148788b1c2f41c8092a6a9ae8cacd6d43582b0cc3379ab7a8922990637e0d44b941c9ae2917bb1070f99cc842d757cd68b52139bb386acaaa186569502e07cd1b77313f60a4c88ecbbbdc44edfd3592bce1be66aaba00fa4e9b9e6a8408c0032933e14d1e027c8bbe2217e5c6cf02d00425e6b9addc0654b5fde0c5fd77b339723b42fccc81dcdd3be884c7c086080cdca1b730c30d9d7c489fa019d3f0c8253129b21ac690963adaa0c2c91dd06ff", 0x1000}, {&(0x7f00000000c0)="e334192624e542f60c", 0x9}], 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000aa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000dc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 856.131539] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\f\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@ipv6_newroute={0x160, 0x18, 0xb21, 0x70bd2d, 0x25dfdbfc, {0xa, 0x0, 0x14, 0x401, 0xfc, 0x1, 0xff, 0x7, 0xa00}, [@RTA_ENCAP={0x114, 0x16, @nested={0x110, 0x95, [@generic="112648c3ba8ca064516096946670111cf9a382c8634f034bf70ee28faa2408a7ec2b165af93b7b41b8324a9350c115c322d4d1412d6938c1806f6d349d765f3943e6b75c1e14375dea7f7bb282978b8beb5bc7ccccb88af5f2351cd8f97299601f7a126d0cc456c9babd3936bf3b952f5589a2a71351306c80b67e", @generic="e9ae9a576cbc0392b46d255489ce42c9d9845cd615ccc7dd06e31f47fbc9101bb9ce43bfb88acd59774a2e1ac1bd285babc8d3ca4b8e722e61d791312b81438281efdecdacbe6ef77e53ac4ffa881815ca12ac4302e4d33590ec2521e352d72c67f6b90a00e9188b3bae81081cc69841f6c5ef93150487f16235aad309283a2c139b816016009a06d0d907223f4d67d9"]}}, @RTA_GATEWAY={0x14, 0x5, @ipv4={[], [], @broadcast}}, @RTA_PREF={0x8, 0x14, 0x1}, @RTA_GATEWAY={0x14, 0x5, @loopback}]}, 0x160}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x400003f, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x5) 03:41:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 856.418451] netlink: 'syz-executor3': attribute type 20 has an invalid length. [ 856.452071] netlink: 'syz-executor3': attribute type 20 has an invalid length. 03:41:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 3: remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000005, 0x400000000000e9, 0x20) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x3, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8f) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x400000, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x114, 0x23, 0x404, 0x70bd2a, 0x25dfdbfb, {0xf}, [@typed={0x10, 0x85, @str='/dev/kvm\x00'}, @generic="ce56741c730f65e2ac2bbb5d48432f23e94da07068cf6ae27718757f8b1b4e9bdd6e8efa4580679458d49625b918a65ffb226c36cdd3e8d1f56b0d22324181e1837b1d26d5ad26e34d7a1fabcd554d957a67d4d15cf451b70d4ca38fd9e835ed61b498245ff141dd4b9f0e8a88e400da91f64def3e5bb6b3a27b9bc13dab2440542a33", @nested={0x14, 0x74, [@typed={0x10, 0x3a, @str='ip6erspan\x00'}]}, @nested={0x58, 0x38, [@generic="9458690b74cfa8a58425b85f59cb2b3efe20a5a477d3f987e54bfa3871616923fca88d9fd71aed4ac4d578eb9b5fb544f5b0404b5d81e5bfd934bb775fbb5aef8a07e9af43e87b8e5ca3", @typed={0x8, 0x95, @str='\'\x00'}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000bd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xfffffffffffffca6, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0xfe22}}, 0x0) mq_open(&(0x7f0000000000)='ip6erspan\x00', 0x40, 0x6, &(0x7f0000000040)={0x7f, 0x80000000, 0x7f, 0xffffffffffffffff, 0x3, 0x0, 0x52, 0x8}) 03:41:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ab00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() 03:41:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:54 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ea00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700001000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4400, 0x0) 03:41:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() 03:41:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x3, 0x6, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x1, 0xd9d, 0x8000, 0xd4, 0x9, 0x9, 0xfff, 0x0, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={r2, 0x9, 0x8, 0x2, 0x7fffffff, 0x6, 0x9, 0x5, {0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x4, 0xff, 0xc4d, 0x7fff, 0x47}}, &(0x7f0000000300)=0xb0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'rose0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000340)={@ipv4={[], [], @broadcast}, 0x4c, r4}) 03:41:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() 03:41:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000040)={0xff, 0x4, 0x6}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ec00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r2, 0x800) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000001c0)={[], 0x0, 0x1, 0x7, 0x0, 0x101, 0x7000, 0x4, [], 0x1}) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="4000001b00", @ANYRES32=0x0, @ANYRES64=r0], 0x3}}, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000380)=0x9, 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) [ 858.086884] QAT: Invalid ioctl [ 858.112535] QAT: Invalid ioctl 03:41:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ba00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=@mpls_delroute={0x58, 0x19, 0x200, 0x70bd26, 0x25dfdbfc, {0x1c, 0x80, 0x20, 0x80000000, 0x0, 0x0, 0xc8, 0x4, 0x200}, [@RTA_OIF={0x8, 0x4, r1}, @RTA_OIF={0x8, 0x4, r2}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x9}, @RTA_OIF={0x8, 0x4, r3}, @RTA_DST={0x14, 0x1, [{0x9, 0x8, 0x7, 0xffffffffffffec9a}, {0x8, 0x4, 0x200, 0x2}, {0x0, 0x9, 0x6, 0x6}, {0xb8e2, 0x401, 0x1, 0x1}]}, @RTA_OIF={0x8, 0x4, r4}]}, 0x1a}}, 0x0) 03:41:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370606e000000402b8b03ff7f98c02acdef07"], 0x40}}, 0x0) 03:41:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000e900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 858.547473] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 03:41:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000eb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.origin\x00', &(0x7f0000000040)=']\x00', 0x2, 0x2) 03:41:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/4\x00') ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x401, 0x4, 0x7, 0x27c, "019a6488c87beb10b67c05cc824dc661b399cdb1e39d890064e12845348dd683"}) connect$unix(r1, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ba00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000011000000200012001000010069703665727370616e0000000c000200080002003000000005d66bfe937737414f5f7a74c0999863a5ffb33823075308d75b957a"], 0x40}}, 0x0) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x0) 03:41:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000aa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x6) 03:41:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x204840) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0xec6, 0x1}, 0x30}, 0x10) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfffffffffffff65a, 0x2) 03:41:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000bd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000e200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000c000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:57 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2c00, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0186404, &(0x7f00000011c0)={&(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, 0x29, &(0x7f0000ffa000/0x5000)=nil, 0x100}) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x4295f46}) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000001200)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c00020008000200300000000ab6a11e480f86618dcf9376c7e4acf6fdcff74cfa656ae446b010c61d4a3d6d4e7fe5fc4ee7f8f21d1e6702848e283f504339e5999a68f209baab90cea0f7cd4360a5d1404d2c16c41a95bfe0367b7d5b2c0700000000000000a889090b91422d963b60f11ecf9a7b"], 0x40}}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f00000001c0)="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"}, 0xffffffffffffff3c) 03:41:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 859.880343] validate_nla: 17 callbacks suppressed [ 859.880354] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:57 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x200000, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000280)) r1 = socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x24262399, @mcast1, 0xdf}, {0xa, 0x4e24, 0x80000001, @mcast1, 0x1}, r2}}, 0x48) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700008b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:57 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') [ 860.194348] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000cb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000140), 0xfffffffffffffcc4, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000ff00711cc624954da5e000010069703665727370616e000000646f8247328db5ddf0c0f847e2e1e2120c000200485dac9f55fc606b03c4df603ff17a5f097cdba73a59f85db773e8147b7b8ca1dceed36c5437022157f893c5f78b2e06f2572914147d2c2c53aee66b91533243efd92f6720ad5b4f552d742f17fa2ed17a3269"], 0x3e}}, 0x8000) 03:41:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:58 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000e500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000040)) 03:41:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 860.675820] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:58 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000cc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\b\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 860.728117] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 03:41:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000cd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 861.026219] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 861.096112] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:58 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_spread_page\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x400440, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x4000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x22000, 0x100) r1 = dup(r0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x5, 0x7, 0xa69, 0xf31, 0x2}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x44000, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000040)={0x17, 0xc3, &(0x7f00000001c0)="2355e7dc3e5a65ed747fd6d48fa8ef45589c17f5dd27ef25da2983c516c9b842f8346d2625f8a90c135e3bb8dfab61812c28363dcf4648fce573cabfe919f87c193f3b5a250f341c578f0005f2b8f2a8d6187979b1facb80709531f601c05fb338b2b0d086aa0b9e7eb4124b41ee0e85f126ee28d1a4095045581ddecc5b2b8b52be272b40bad31dfe703ff185e316f3318b807f696458b611c6ee17d9744cffc2118fd0fcaa80532d8fa3598bf4328fedb1b1ade7bf2b7a40fff0f7a2486454269b1b"}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001ffb00000000a400000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[{0x8, 0x100}, {0x4, 0xffff}], 0x2) 03:41:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 861.383527] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 861.472445] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000c500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040), 0x2) 03:41:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 861.729467] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) [ 861.824796] netlink: 'syz-executor3': attribute type 2 has an invalid length. 03:41:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'ip6erspan\x00'}, {0x20, ':\x00'}], 0xa, "bbf50692c5e5993aa4efa10b3420adaa4da405228c332ef36fdc661eaf0b21ec2f440745d152673e8c5563a2ac06f41a23617c768e3e95bcb905f818bc21d1384f2f595d3a53728898d5bc53f8008df3466dae1f6fd9b7ef0560ef52bfdbfa2ce09eaab94d28fd5f35ae703bbb7c11b42ee231963321a0c84dd448d5287175cad9a90101084bc78d86a92a70e3971e4e8c4e1d872de8"}, 0xaf) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0xc0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000040)={0x0, 0x2, 0xfffffffffffffff5, &(0x7f0000000000)=0x6d08}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x2, 0x284}) 03:41:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:41:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000e200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:41:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:41:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:41:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x100, 0x0) write$P9_RXATTRWALK(r1, &(0x7f00000001c0)={0xf, 0x1f, 0xfffffffffffff801, 0x3}, 0xf) ioctl$sock_netdev_private(r0, 0x89fd, &(0x7f0000000000)="9a2b7ebb80ad7cab533e1a4e06e7f82ab500667a0b0fc6f7ad0eec2687a9f85741eeffdcfe8f66089b32d7d3718a554fff31c8f68e2678aae3c0aa4121ca500ce6076590fb5264d3aa57e244b840f30183572bed1fb341f7cf6c69dc4910a9fe9e87e2dadbc7b8bf3cfd1c8bc6d310ce02d5ec9ce96498ae017e65b94f3263d5d5f89f5ae56def280f7757955df2ace33a8bc81c5d2e1951") sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:41:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000fc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:42:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0002000800020030000000"], 0x40}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 03:42:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ab00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:42:00 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000008acc7e6e5fb8d538a6474a0d9b3694170000000000ca7220001200100001006970366572737061"], 0x3}}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8, 0x113040) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000180)={0x2, 0x2, 0x2, {0x590, 0xe3b9, 0x100000000, 0xff}}) 03:42:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ea00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) 03:42:00 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000c300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x62d7495f, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x0, 0x7}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e24, 0x6, @local, 0x6}}, 0x2000000008, 0x7fff}, &(0x7f00000001c0)=0xfffffffffffffe35) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r3, 0x81}, 0x8) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x30}]]}}}]}, 0x40}}, 0x0) 03:42:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000bd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) 03:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) 03:42:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:00 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ca00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:00 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40, 0x200) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={{0x2, 0x5, 0x4f46471f, 0x9, 0x50, 0x3}, 0xae, 0x0, 0x10000000000, 0x0, 0x3, "e69f3e2b0ac0a8fb067b257f8b0b9b499d3e529d653b6913be197b739c36c162b025306c86b7a35251ecf9f53bcca90c2050b32ecd089082f1f5972be90fc6cafbddaa88c37a5d769e32bc068fd2897af35c3b992a0a992b5eecc01b68bccaf9872d367c149e248f53203bf49a4780d1edbae59f3936111d70aff2cf97bc75db"}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={&(0x7f0000000140), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e000083de9d1848619430000000"], 0x40}}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @multicast2}, &(0x7f0000000200)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in, @in6=@mcast1, 0x4e22, 0xfffffffffffffff8, 0x4e22, 0x20, 0xa, 0xa0, 0x20, 0x3f, r2, r3}, {0x4, 0x6, 0x2, 0xbc3, 0x100000000, 0xbb2, 0x0, 0x2}, {0x1, 0x1ff, 0x10000, 0x285}, 0x20, 0x6e6bb1, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast1, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x4, 0x3, 0x7, 0x7c, 0x7f, 0x172f}}, 0xe8) 03:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 863.180881] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 03:42:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') [ 863.241011] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 03:42:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000b300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:42:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:42:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700008700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000d000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000008a00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000dd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700009600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000c200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008a00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000a600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000008900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000c100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\t\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008a00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000e600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000b900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000b200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:42:06 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000a100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000b900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000d000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000eb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000ce00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000dd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:42:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000a900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000008c00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009d00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000dd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000ad00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008c00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000009f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000b600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000e00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000a1", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000c900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() 03:42:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() 03:42:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000ed00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000f300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) 03:42:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/216, 0xd8) 03:42:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ec00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x00') ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000080)={0x0, 0x0, 0x2}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) io_setup(0x3, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0xd00, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) 03:42:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000380)={0x4, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 03:42:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000f3", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x3fe, @loopback}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000340)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7") sendfile(r0, r2, &(0x7f00000000c0), 0x401) 03:42:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000fa00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) request_key(&(0x7f0000000740)='blacklist\x00', &(0x7f0000000780)={'syz', 0x0}, &(0x7f00000007c0)='security\x00', 0xfffffffffffffffa) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) 03:42:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r0}], 0x1, &(0x7f0000000500)={0x0, r2+10000000}, &(0x7f0000000540), 0x8) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:42:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 03:42:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000008b", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000100)=""/119, &(0x7f0000000040)=0x77) close(r1) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty, 0x81}, 0x1c) 03:42:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000c900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000000)=""/15, 0xf}], 0x1) 03:42:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ab00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000a500", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:11 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0x8010550e, &(0x7f0000000240)) 03:42:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ce00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000280)={@multicast1, @local}, 0xc) r1 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast1, @local, 0x0, 0x1, [@multicast2]}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x10004e23, @multicast1}, 0x10) 03:42:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 03:42:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000e00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "ccf6b5b45d2d0dd2cb38f2afb14c5d42412709319654cfaa7d97d0760cf97fd6746439ee010b82cba6a25e596d415e04efd9e638300680d522236512dbc3456a", "5b53813f1d40ca2988dcc4e5722a444ccec98f23a6a6af6fd2ac655f403e63c2"}) 03:42:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000040)="14909e1666792f66a4f3d25086793d1b7f681604615279d65a1ba46c489cc06fe97cc7fe0cfc85ab596aad92218816c1d5", 0x31}], 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'teql0\x00', {0x2, 0x0, @dev}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:42:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) [ 874.565591] [ 874.567264] ====================================================== [ 874.573581] WARNING: possible circular locking dependency detected [ 874.579907] 4.20.0-rc1+ #229 Not tainted [ 874.583967] ------------------------------------------------------ [ 874.584947] kobject: 'kvm' (00000000ca62ad5e): kobject_uevent_env [ 874.590284] syz-executor2/18622 is trying to acquire lock: [ 874.590292] 00000000b916e62f (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1e/0x40 [ 874.590325] [ 874.590325] but task is already holding lock: [ 874.590330] 000000009e11ae2c (&lo->lo_ctl_mutex#2){+.+.}, at: lo_compat_ioctl+0x11b/0x170 [ 874.590365] [ 874.590365] which lock already depends on the new lock. [ 874.590365] [ 874.612136] kobject: 'kvm' (00000000ca62ad5e): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 874.616245] [ 874.616245] the existing dependency chain (in reverse order) is: [ 874.616250] [ 874.616250] -> #2 (&lo->lo_ctl_mutex#2){+.+.}: [ 874.616281] __mutex_lock+0x166/0x16f0 [ 874.616294] mutex_lock_nested+0x16/0x20 [ 874.616305] lo_release+0xa3/0x1f0 [ 874.616317] __blkdev_put+0x4f6/0x830 [ 874.616334] blkdev_put+0x98/0x540 [ 874.641485] kobject: 'kvm' (00000000ca62ad5e): kobject_uevent_env [ 874.641996] blkdev_close+0x8b/0xb0 [ 874.671839] kobject: 'kvm' (00000000ca62ad5e): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 874.673028] __fput+0x385/0xa30 [ 874.673042] ____fput+0x15/0x20 [ 874.673057] task_work_run+0x1e8/0x2a0 [ 874.673071] exit_to_usermode_loop+0x318/0x380 [ 874.673091] do_syscall_64+0x6be/0x820 [ 874.717941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.723646] [ 874.723646] -> #1 (loop_index_mutex){+.+.}: [ 874.729464] __mutex_lock+0x166/0x16f0 [ 874.733868] mutex_lock_nested+0x16/0x20 [ 874.738451] lo_open+0x1b/0xb0 [ 874.742161] __blkdev_get+0x360/0x13c0 [ 874.746562] blkdev_get+0xc1/0xb50 [ 874.750645] blkdev_open+0x1fb/0x280 [ 874.754875] do_dentry_open+0x499/0x1250 [ 874.759453] vfs_open+0xa0/0xd0 [ 874.763272] path_openat+0x12bc/0x5150 [ 874.767676] do_filp_open+0x255/0x380 [ 874.771999] do_sys_open+0x568/0x700 [ 874.776228] __x64_sys_open+0x7e/0xc0 [ 874.780547] do_syscall_64+0x1b9/0x820 [ 874.784956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.790652] [ 874.790652] -> #0 (&bdev->bd_mutex){+.+.}: [ 874.796380] lock_acquire+0x1ed/0x520 [ 874.800703] __mutex_lock+0x166/0x16f0 [ 874.805111] mutex_lock_nested+0x16/0x20 [ 874.809695] blkdev_reread_part+0x1e/0x40 [ 874.814365] loop_reread_partitions+0x163/0x190 [ 874.819555] loop_set_status+0xb95/0x1010 [ 874.824224] loop_set_status_compat+0xa4/0xf0 [ 874.829237] lo_compat_ioctl+0x13a/0x170 [ 874.833818] compat_blkdev_ioctl+0x3ca/0x1b30 [ 874.839359] __ia32_compat_sys_ioctl+0x20e/0x630 [ 874.844640] do_fast_syscall_32+0x34d/0xfb2 [ 874.849482] entry_SYSENTER_compat+0x70/0x7f [ 874.854399] [ 874.854399] other info that might help us debug this: [ 874.854399] [ 874.862549] Chain exists of: [ 874.862549] &bdev->bd_mutex --> loop_index_mutex --> &lo->lo_ctl_mutex#2 [ 874.862549] [ 874.873915] Possible unsafe locking scenario: [ 874.873915] [ 874.879965] CPU0 CPU1 [ 874.884620] ---- ---- [ 874.889274] lock(&lo->lo_ctl_mutex#2); [ 874.893330] lock(loop_index_mutex); [ 874.899643] lock(&lo->lo_ctl_mutex#2); [ 874.906217] lock(&bdev->bd_mutex); [ 874.909920] [ 874.909920] *** DEADLOCK *** [ 874.909920] [ 874.915977] 1 lock held by syz-executor2/18622: [ 874.920633] #0: 000000009e11ae2c (&lo->lo_ctl_mutex#2){+.+.}, at: lo_compat_ioctl+0x11b/0x170 [ 874.929404] [ 874.929404] stack backtrace: [ 874.933911] CPU: 0 PID: 18622 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #229 [ 874.941260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.950609] Call Trace: [ 874.953196] dump_stack+0x244/0x39d [ 874.957801] ? dump_stack_print_info.cold.1+0x20/0x20 [ 874.962994] ? vprintk_func+0x85/0x181 [ 874.966886] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 874.972595] ? save_trace+0xe0/0x290 [ 874.976313] __lock_acquire+0x3399/0x4c20 [ 874.980470] ? mark_held_locks+0x130/0x130 [ 874.984708] ? print_bfs_bug+0x80/0x80 [ 874.988595] ? mark_held_locks+0x130/0x130 [ 874.992831] ? __lock_acquire+0x62f/0x4c20 [ 874.997066] ? find_held_lock+0x36/0x1c0 [ 875.001132] ? check_preemption_disabled+0x48/0x280 [ 875.006151] ? check_usage+0x1aa/0x790 [ 875.010036] ? mark_held_locks+0x130/0x130 [ 875.014278] ? _raw_spin_unlock_irq+0x27/0x80 [ 875.018774] ? print_usage_bug+0xc0/0xc0 [ 875.022836] ? print_usage_bug+0xc0/0xc0 [ 875.026900] ? print_usage_bug+0xc0/0xc0 [ 875.031016] ? __bfs+0x321/0x780 [ 875.034383] ? zap_class+0x640/0x640 [ 875.038099] ? __lock_acquire+0x62f/0x4c20 [ 875.042363] lock_acquire+0x1ed/0x520 [ 875.046163] ? blkdev_reread_part+0x1e/0x40 [ 875.050484] ? lock_release+0xa00/0xa00 [ 875.054457] ? perf_trace_sched_process_exec+0x860/0x860 [ 875.059907] ? mark_held_locks+0x130/0x130 [ 875.064143] ? blkdev_reread_part+0x1e/0x40 [ 875.068465] __mutex_lock+0x166/0x16f0 [ 875.072348] ? blkdev_reread_part+0x1e/0x40 [ 875.076672] ? blkdev_reread_part+0x1e/0x40 [ 875.081000] ? mutex_trylock+0x2b0/0x2b0 [ 875.085063] ? lock_is_held_type+0x210/0x210 [ 875.089473] ? lock_is_held_type+0x210/0x210 [ 875.093881] ? check_preemption_disabled+0x48/0x280 [ 875.098897] ? zap_class+0x640/0x640 [ 875.102607] ? zap_class+0x640/0x640 [ 875.106323] ? print_usage_bug+0xc0/0xc0 [ 875.110385] ? zap_class+0x640/0x640 [ 875.114102] ? print_usage_bug+0xc0/0xc0 [ 875.118165] ? find_held_lock+0x36/0x1c0 [ 875.122244] ? mark_held_locks+0xc7/0x130 [ 875.126404] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 875.131514] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 875.136620] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 875.141200] ? trace_hardirqs_on+0xbd/0x310 [ 875.145525] ? kasan_check_read+0x11/0x20 [ 875.149677] ? __wake_up_common_lock+0x1d0/0x330 [ 875.154441] ? trace_hardirqs_off_caller+0x310/0x310 [ 875.159570] ? percpu_ref_resurrect+0x2f0/0x4b0 [ 875.164239] ? trace_hardirqs_off_caller+0x310/0x310 [ 875.169346] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 875.174459] ? __wake_up_common_lock+0x1d0/0x330 [ 875.179222] mutex_lock_nested+0x16/0x20 [ 875.183285] ? mutex_lock_nested+0x16/0x20 [ 875.187520] blkdev_reread_part+0x1e/0x40 [ 875.191673] loop_reread_partitions+0x163/0x190 [ 875.196351] ? __loop_update_dio+0x6b0/0x6b0 [ 875.200766] loop_set_status+0xb95/0x1010 [ 875.204919] loop_set_status_compat+0xa4/0xf0 [ 875.209420] ? loop_set_status+0x1010/0x1010 [ 875.213848] lo_compat_ioctl+0x13a/0x170 [ 875.217996] ? lo_ioctl+0x1d60/0x1d60 [ 875.221811] compat_blkdev_ioctl+0x3ca/0x1b30 [ 875.226313] ? bfq_create_group_hierarchy+0x120/0x120 [ 875.231505] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 875.236091] ? bfq_create_group_hierarchy+0x120/0x120 [ 875.241286] __ia32_compat_sys_ioctl+0x20e/0x630 [ 875.246051] do_fast_syscall_32+0x34d/0xfb2 [ 875.250377] ? do_int80_syscall_32+0x890/0x890 [ 875.254960] ? entry_SYSENTER_compat+0x68/0x7f [ 875.259542] ? trace_hardirqs_off_caller+0xbb/0x310 [ 875.264559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 875.269403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 875.274251] ? trace_hardirqs_on_caller+0x310/0x310 [ 875.279265] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 875.284281] ? prepare_exit_to_usermode+0x291/0x3b0 [ 875.289299] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 875.294145] entry_SYSENTER_compat+0x70/0x7f [ 875.298553] RIP: 0023:0xf7f8ca29 03:42:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000dd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) [ 875.301923] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 875.320827] RSP: 002b:00000000f5f880cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 875.328540] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000004c02 [ 875.335807] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 875.343074] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 875.350341] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 875.357612] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 03:42:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000008300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 875.365102] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 875.372028] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 875.380215] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 875.390897] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 875.409485] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env 03:42:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffe, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x20c20}) [ 875.416004] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 875.416107] loop_reread_partitions: partition scan of loop0 (Ìöµ´]- ÒË8ò¯±L]BA' 1–TϪ}—Ðv ùÖtd9î ‚˦¢^YmA^ïÙæ80€Õ"#eÛÃE) failed (rc=-13) [ 875.429359] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 875.444932] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:42:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e000000000000", 0x2e}], 0x1, &(0x7f0000000040)}, 0x0) [ 875.463973] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 875.476423] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ca00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000cd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 875.510371] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 875.527820] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:42:13 executing program 5: 03:42:13 executing program 2: 03:42:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e000000000000", 0x2e}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) [ 875.593724] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 875.615885] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000e000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:13 executing program 5: 03:42:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\v\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 875.649221] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 875.662509] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 875.683285] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env 03:42:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e000000000000", 0x2e}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:13 executing program 2: [ 875.716717] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 875.744333] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:13 executing program 5: 03:42:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 875.766504] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 875.780824] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 875.787602] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 875.797709] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env 03:42:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e000000000000", 0x2e}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:13 executing program 2: 03:42:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) [ 875.814288] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 875.849748] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000c200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:13 executing program 5: [ 875.859970] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:13 executing program 2: [ 875.889966] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 875.906222] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:13 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e000000000000", 0x2e}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:13 executing program 5: [ 875.934906] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 875.941451] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 875.969024] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env 03:42:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:13 executing program 2: [ 875.989549] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 876.026276] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:13 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e000000000000", 0x2e}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:13 executing program 5: 03:42:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 876.032757] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009a00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:13 executing program 2: [ 876.074953] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 876.085228] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.110026] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env 03:42:13 executing program 5: 03:42:13 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e000000000000", 0x2e}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:13 executing program 2: [ 876.124992] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 876.160383] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env 03:42:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000d300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:14 executing program 5: 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 876.185651] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 876.206393] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 876.212870] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000040)}, 0x0) 03:42:14 executing program 2: [ 876.265137] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 876.283374] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.299152] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env 03:42:14 executing program 5: 03:42:14 executing program 2: 03:42:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000ea00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000aa", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 5: [ 876.315781] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 876.338425] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 876.344931] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000040)}, 0x0) 03:42:14 executing program 2: [ 876.389441] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 876.415401] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:42:14 executing program 5: 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000b200", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000008900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 876.451103] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 876.475031] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:14 executing program 2: 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000040)}, 0x0) [ 876.495960] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 876.503011] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 876.530474] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env 03:42:14 executing program 5: 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000040)}, 0x0) [ 876.549451] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 876.576451] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 876.587971] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:14 executing program 2: 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 5: 03:42:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) [ 876.611760] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 876.626101] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000b600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:14 executing program 5: 03:42:14 executing program 2: [ 876.656605] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 876.672940] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000fb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 5: [ 876.720614] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 876.749602] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000c0", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:14 executing program 2: [ 876.780537] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 876.787214] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 876.797583] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 876.804118] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:14 executing program 5: [ 876.847064] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 876.865443] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 876.885542] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e18000000", 0x17}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000ed", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000000e", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 876.891995] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:14 executing program 2: 03:42:14 executing program 5: 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e18000000", 0x17}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) [ 876.932939] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 876.949773] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.966703] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 876.973153] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:14 executing program 2: 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000f100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 5: 03:42:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e18000000", 0x17}], 0x1, &(0x7f0000000040)}, 0x0) [ 877.029749] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 877.042882] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 877.053136] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 877.065579] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:42:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:14 executing program 5: 03:42:14 executing program 2: [ 877.100108] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 877.122052] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000db00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000c900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:14 executing program 1: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) [ 877.147526] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 877.167691] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:15 executing program 1: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000d100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 877.223744] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 877.254739] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000ba00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) [ 877.293727] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 877.306613] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:15 executing program 1: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) 03:42:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000b7", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 877.351318] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 877.380395] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e00", 0x29}], 0x1, &(0x7f0000000040)}, 0x0) [ 877.414027] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 877.443442] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 877.454384] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) 03:42:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) [ 877.477244] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 877.516530] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e00", 0x29}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000d3", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 877.523010] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:42:15 executing program 2: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 877.566259] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 877.599320] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000ef00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e00", 0x29}], 0x1, &(0x7f0000000040)}, 0x0) [ 877.625077] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 877.645800] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:42:15 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) 03:42:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000a3", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 877.671524] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 877.686365] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 877.732710] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 877.745806] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:15 executing program 1: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e00000000", 0x2c}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000b000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 877.776934] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env [ 877.797007] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000e6", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 877.830008] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 877.854758] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:15 executing program 1: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e00000000", 0x2c}], 0x1, &(0x7f0000000040)}, 0x0) [ 877.880081] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 877.897798] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 877.928913] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env 03:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\a\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e00000000", 0x2c}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:15 executing program 1: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000f9", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 877.962388] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 877.991915] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e0000000000", 0x2d}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 878.012546] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 878.038973] kobject: 'loop3' (000000002f7ecdba): kobject_uevent_env 03:42:15 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x402) inotify_rm_watch(0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000440), 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) [ 878.072071] kobject: 'loop3' (000000002f7ecdba): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 878.100376] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env 03:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000dd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000dc", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e0000000000", 0x2d}], 0x1, &(0x7f0000000040)}, 0x0) [ 878.126267] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 878.148641] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 878.155116] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:16 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x402) inotify_rm_watch(0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000440), 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) 03:42:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r0, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r0, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000d000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) [ 878.220198] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 878.252342] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e00000019008100e00f80ecdb4cb92e0a480e1800000000e8bd6efb12000800080300000000003e0000000000", 0x2d}], 0x1, &(0x7f0000000040)}, 0x0) 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 878.285772] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 878.301851] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 878.325902] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env 03:42:16 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x402) inotify_rm_watch(0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000440), 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 878.332363] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:42:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ccf6b5b45d2d0dd2cb38f2afb14c5d42412709319654cfaa7d97d0760cf97fd6746439ee010b82cba6a25e596d415e04efd9e638300680d522236512dbc3456a", "5b53813f1d40ca2988dcc4e5722a444ccec98f23a6a6af6fd2ac655f403e63c2"}) [ 878.378647] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 878.404647] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000ce00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x402) inotify_rm_watch(0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000440), 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000009100", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 878.429999] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 878.438939] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 878.449146] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 878.456949] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 878.468614] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:16 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0x5646, &(0x7f0000000240)={0x0, 0x0, 0x0, [], &(0x7f0000000200)}) [ 878.480900] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 878.520144] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env 03:42:16 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x402) inotify_rm_watch(0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000440), 0x8) 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000dd00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 878.541084] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 878.551474] Sensor A: ================= START STATUS ================= [ 878.564755] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 878.575748] Sensor A: Test Pattern: 75% Colorbar 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000097", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r0, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:16 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x402) inotify_rm_watch(0xffffffffffffffff, 0x0) [ 878.586442] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 878.602483] Sensor A: Vertical Flip: false [ 878.622671] Sensor A: Horizontal Flip: false [ 878.633464] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 878.640239] Sensor A: Brightness: 128 [ 878.644163] Sensor A: Contrast: 128 [ 878.648345] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 878.667216] Sensor A: Hue: 0 [ 878.670349] Sensor A: Saturation: 128 [ 878.677538] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\x00\x00\x00\r\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 878.686130] Sensor A: ================== END STATUS ================== [ 878.697989] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 878.709066] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:16 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x402) 03:42:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) [ 878.735554] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 878.751442] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 878.762219] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 878.786353] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 878.806024] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 878.816833] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c900", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000d800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 878.828834] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000000000000f", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 878.886089] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 878.913580] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000008b00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 878.936979] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 878.957527] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 878.968001] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) [ 878.978962] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:16 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 03:42:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000e800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 879.020265] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 879.036334] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 879.053731] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env 03:42:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000005", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0xf0000000000027f, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0xb008}], 0x2, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 879.085092] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 879.113773] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 879.122270] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:42:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000014c0)={'veth1_to_bond\x00'}) 03:42:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00\x00\x00\n\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000ab00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740), 0x0, 0x0, 0x0) [ 879.156034] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 879.174848] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:17 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 03:42:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) [ 879.226274] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 879.236096] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 879.263348] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000000000cc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740), 0x0, 0x0, 0x0) 03:42:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 879.298588] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 879.325983] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env 03:42:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 879.340523] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 879.358071] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 879.364796] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 879.392754] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env 03:42:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) 03:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740), 0x0, 0x0, 0x0) 03:42:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000c2", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000f700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 879.426420] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 879.450332] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 879.457557] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:17 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 03:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}], 0x1, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) [ 879.500024] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 879.528560] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000008700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:17 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 879.571299] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 879.580794] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 879.597885] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 879.604393] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}], 0x1, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) [ 879.616086] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 879.624816] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:42:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000001000", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009300", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 879.664865] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 879.690912] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 879.736748] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 879.743204] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 879.766749] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 879.774836] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000f800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}], 0x1, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:17 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 879.827105] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 879.833578] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 879.881892] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 879.894338] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:42:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) 03:42:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000008400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002bc0)=""/4096, 0x1000}], 0x1, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) 03:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009c00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 879.932844] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 879.951553] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 879.958653] kobject: '0:46' (00000000561fcc96): kobject_add_internal: parent: 'bdi', set: 'devices' [ 879.963605] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env 03:42:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 879.978368] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 879.989181] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 880.014302] kobject: '0:46' (00000000561fcc96): kobject_uevent_env [ 880.025437] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! 03:42:17 executing program 3: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) 03:42:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 880.029640] kobject: '0:46' (00000000561fcc96): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 880.035798] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002bc0)=""/4096, 0x1000}], 0x1, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 880.094646] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 880.114204] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 880.121259] kobject: '0:46' (00000000561fcc96): kobject_uevent_env [ 880.132071] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 880.156747] kobject: '0:46' (00000000561fcc96): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 880.161857] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 880.169242] kobject: '0:46' (00000000561fcc96): kobject_cleanup, parent (null) [ 880.184041] kobject: '0:46' (00000000561fcc96): calling ktype release [ 880.189790] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 880.191977] kobject: '0:46': free name 03:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, 0x0, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009f00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000400", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") 03:42:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) 03:42:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000840), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002bc0)=""/4096, 0x1000}], 0x1, &(0x7f0000003cc0)}}], 0x1, 0x0, 0x0) [ 880.197403] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 880.211300] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 880.217997] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 880.229854] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 880.236577] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:42:18 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2b87b07be878ab176b34f5411ed6def13da9cec1cc68af24ee9fc99b571c475168d5d16c50e8837ac893e23ad0699a5300", "3d1a913dbaaae5dbcf40ce273d054a53d5b743e1c6958dacf69ac4c4f6e363a19f04d8c665b1eebd06a66b08a306000000000000001e299a140b461300", "6afce5acdf7fbff50387b0d11d44d1d0e90b7f3e00"}) 03:42:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) [ 880.272465] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 880.293513] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:42:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000091", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 880.338600] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 880.356146] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000098", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 880.387174] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 880.399405] kobject: '0:46' (00000000ff5eb48b): kobject_add_internal: parent: 'bdi', set: 'devices' [ 880.412703] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 880.440930] kobject: '0:46' (00000000ff5eb48b): kobject_uevent_env [ 880.462867] kobject: '0:46' (00000000ff5eb48b): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 880.486994] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 880.500268] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 880.510726] kobject: '0:52' (00000000a4872e77): kobject_add_internal: parent: 'bdi', set: 'devices' [ 880.528796] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 880.537902] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 880.547383] kobject: '0:46' (00000000ff5eb48b): kobject_uevent_env [ 880.549412] kobject: '0:46' (00000000ff5eb48b): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 880.559975] kobject: '0:52' (00000000a4872e77): kobject_uevent_env [ 880.569954] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 880.577178] kobject: '0:52' (00000000a4872e77): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 880.587309] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 880.599249] kobject: '0:46' (00000000ff5eb48b): kobject_cleanup, parent (null) [ 880.599285] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 880.615569] kobject: '0:46' (00000000ff5eb48b): calling ktype release [ 880.621162] kobject: '0:53' (0000000070eecd7e): kobject_add_internal: parent: 'bdi', set: 'devices' [ 880.626956] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 880.642699] kobject: '0:53' (0000000070eecd7e): kobject_uevent_env [ 880.648004] kobject: '0:46': free name [ 880.650343] kobject: '0:53' (0000000070eecd7e): fill_kobj_path: path = '/devices/virtual/bdi/0:53' [ 880.656275] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 880.673402] kobject: '0:52' (00000000a4872e77): kobject_uevent_env [ 880.679925] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') 03:42:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) 03:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000002", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000bc", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 880.680804] kobject: '0:52' (00000000a4872e77): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 880.703637] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 880.711116] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 880.716820] kobject: '0:52' (00000000a4872e77): kobject_cleanup, parent (null) [ 880.724637] kobject: '0:53' (0000000070eecd7e): kobject_uevent_env [ 880.734362] kobject: '0:52' (00000000a4872e77): calling ktype release 03:42:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) 03:42:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000000000000000bd", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 880.771025] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 880.778057] kobject: '0:52': free name [ 880.790346] kobject: '0:53' (0000000070eecd7e): fill_kobj_path: path = '/devices/virtual/bdi/0:53' [ 880.797660] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e6700000000e600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 880.826841] kobject: '0:53' (0000000070eecd7e): kobject_cleanup, parent (null) [ 880.834908] kobject: '0:46' (00000000552c9662): kobject_add_internal: parent: 'bdi', set: 'devices' [ 880.835179] kobject: '0:53' (0000000070eecd7e): calling ktype release [ 880.857059] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 880.870952] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 880.889963] kobject: '0:53': free name [ 880.896008] kobject: '0:46' (00000000552c9662): kobject_uevent_env [ 880.902395] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 880.904414] kobject: '0:46' (00000000552c9662): fill_kobj_path: path = '/devices/virtual/bdi/0:46' 03:42:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) 03:42:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) [ 880.927780] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 880.955886] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env 03:42:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000000000000000000002", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000eb00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) geteuid() unlink(&(0x7f0000000040)='./file0\x00') [ 880.988452] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 880.990637] kobject: '0:46' (00000000552c9662): kobject_uevent_env [ 881.011414] kobject: '0:46' (00000000552c9662): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 881.037423] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 881.043425] kobject: '0:46' (00000000552c9662): kobject_cleanup, parent (null) [ 881.071148] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 881.072803] kobject: '0:46' (00000000552c9662): calling ktype release [ 881.099779] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 881.122917] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.146016] kobject: '0:46': free name [ 881.161439] kobject: '0:52' (00000000c75aa055): kobject_add_internal: parent: 'bdi', set: 'devices' [ 881.177054] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 881.183654] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 881.204179] kobject: '0:52' (00000000c75aa055): kobject_uevent_env 03:42:19 executing program 1: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)) 03:42:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000c800", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x200040) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000740)=""/158) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg$inet_sctp(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x101, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="ad41251ab7a0bede384e0959e667fec4f823d6da9426e9693d8784be683c7d1e51d31c7e8718c125dc1f24298da497a111ea636af58697c6537269278aa35ef0760f43a7646be862384d23bc97959b6cc5607b1355e40dda66d98433a4fab64a759f7ada68bb4d830fced2612d4ba9f8a89a1389a893012806cf57570613d686de18d0e02d149c1f5645a040634e458fcebe0334dc0637de2649bbcd7562a4a196a0438b8611dbfcf0bd952040893fe05a64", 0xb2}, {&(0x7f0000000240)="18dfbdcd41bb7156544ae66bd3c250ca111899842891c6d26b1d78f93e0ce4afd29977963017042cd993bf96a2fa3a4f6e36f798ddcc26fe5787542c98f8be61f02addac2cf06082b17dfac3fe9b50938ddbf1114862ea88571f73d25359", 0x5e}], 0x2, &(0x7f0000000340)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x7ff}}, @dstaddrv6={0x1c}, @dstaddrv6={0x1c}], 0x4c, 0x8000}], 0x1, 0x20000010) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) connect(r1, &(0x7f0000000480)=@ll={0x11, 0x1d, r3, 0x1, 0x8}, 0x80) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6074}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000040)='./file0\x00') 03:42:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e670000009700", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 881.211586] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 881.218489] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 881.229311] kobject: '0:52' (00000000c75aa055): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 881.239540] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 881.246326] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 881.313560] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 881.338044] kobject: '0:52' (00000000c75aa055): kobject_uevent_env 03:42:19 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)) 03:42:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000dc00", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 03:42:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, "726e67000000a600", 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 881.356615] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 881.383749] kobject: '0:52' (00000000c75aa055): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 881.402660] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 881.419118] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.432585] kobject: '0:52' (00000000c75aa055): kobject_cleanup, parent (null) [ 881.452856] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env 03:42:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)) [ 881.473746] kobject: '0:52' (00000000c75aa055): calling ktype release [ 881.488180] kobject: '0:46' (00000000474e185f): kobject_add_internal: parent: 'bdi', set: 'devices' [ 881.495640] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 881.517248] kobject: '0:52': free name [ 881.551036] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 881.553353] kobject: '0:46' (00000000474e185f): kobject_uevent_env [ 881.566364] kobject: '0:46' (00000000474e185f): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 881.603921] kobject: '0:46' (00000000474e185f): kobject_uevent_env [ 881.611190] kobject: '0:46' (00000000474e185f): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 881.622770] kobject: '0:46' (00000000474e185f): kobject_cleanup, parent (null) [ 881.633170] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 881.636938] kobject: '0:46' (00000000474e185f): calling ktype release [ 881.650107] kobject: '0:46': free name [ 881.657251] kobject: 'loop4' (0000000044e1ca35): kobject_uevent_env [ 881.663707] kobject: 'loop4' (0000000044e1ca35): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 881.686484] kobject: 'loop2' (0000000062de75d6): kobject_uevent_env [ 881.699113] kobject: 'loop2' (0000000062de75d6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 881.710946] kobject: 'loop1' (00000000c9035f80): kobject_uevent_env [ 881.718380] kobject: 'loop1' (00000000c9035f80): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.728406] kobject: 'loop5' (000000007cc7d3e0): kobject_uevent_env [ 881.734920] kobject: 'loop5' (000000007cc7d3e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 881.752720] kobject: 'loop0' (0000000063cb539e): kobject_uevent_env [ 881.760892] kobject: 'loop0' (0000000063cb539e): fill_kobj_path: path = '/devices/vi